Your SlideShare is downloading. ×
0
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Privacy Enhancing Technology

322

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
322
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 2.
    • Services & Applications
      • Solutions for standard app's
        • policy enforcement, auditing
      • New paradigms
        • federated id mgmt
        • privacy rating services
        • anonymous payment
      • Privacy-friendly business models
        • depersonalized analysis
        • anonymous transactions
      • User models and interfaces
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 3.
    • Privacy Management
      • Classification and inventory of ( legacy ) data
      • Extensions to databases
      • Rich authorization policies
      • Enforcement
      • Consistent external and internal policies
      • Transitivity of policies
      • Negotiation of policies
      • User interfaces
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 4.
    • Data Minimization
      • Pseudonymity and identity management
      • Local/trusted computations
      • Data transformation
        • depersonalization
        • anonymization
        • aggregation, summary
        • randomization
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 5.
    • Security Technology
      • Access control (e.g., RBAC, fine-grained, dynamic roles)
      • Encryption and authentication
      • User interfaces
      • Cryptographic protocols
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 6.
    • Privacy Violation Detection
      • Real-time detection
      • Batch-mode detection
      • Auditing
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 7.
    • Verification and Certification
      • Precise semantics of mechanisms on blue layers
      • Formal notion of "privacy"
      • Evaluation criteria
      • Static analysis and formal verification of processes
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 8.
    • Limitations
      • Need policies balancing privacy desires and information needs.
      • Many processes need detailed personal information.
    • Exposures
      • Once information is released, misuse cannot be prevented, often not even detected, and not taken back.
      • Often, illegal collection of personal information cannot be prevented.
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology

×