Your SlideShare is downloading. ×
0
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Privacy Enhancing Technology
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Privacy Enhancing Technology

325

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
325
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 2. <ul><li>Services & Applications </li></ul><ul><ul><li>Solutions for standard app's </li></ul></ul><ul><ul><ul><li>policy enforcement, auditing </li></ul></ul></ul><ul><ul><li>New paradigms </li></ul></ul><ul><ul><ul><li>federated id mgmt </li></ul></ul></ul><ul><ul><ul><li>privacy rating services </li></ul></ul></ul><ul><ul><ul><li>anonymous payment </li></ul></ul></ul><ul><ul><li>Privacy-friendly business models </li></ul></ul><ul><ul><ul><li>depersonalized analysis </li></ul></ul></ul><ul><ul><ul><li>anonymous transactions </li></ul></ul></ul><ul><ul><li>User models and interfaces </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 3. <ul><li>Privacy Management </li></ul><ul><ul><li>Classification and inventory of ( legacy ) data </li></ul></ul><ul><ul><li>Extensions to databases </li></ul></ul><ul><ul><li>Rich authorization policies </li></ul></ul><ul><ul><li>Enforcement </li></ul></ul><ul><ul><li>Consistent external and internal policies </li></ul></ul><ul><ul><li>Transitivity of policies </li></ul></ul><ul><ul><li>Negotiation of policies </li></ul></ul><ul><ul><li>User interfaces </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 4. <ul><li>Data Minimization </li></ul><ul><ul><li>Pseudonymity and identity management </li></ul></ul><ul><ul><li>Local/trusted computations </li></ul></ul><ul><ul><li>Data transformation </li></ul></ul><ul><ul><ul><li>depersonalization </li></ul></ul></ul><ul><ul><ul><li>anonymization </li></ul></ul></ul><ul><ul><ul><li>aggregation, summary </li></ul></ul></ul><ul><ul><ul><li>randomization </li></ul></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 5. <ul><li>Security Technology </li></ul><ul><ul><li>Access control (e.g., RBAC, fine-grained, dynamic roles) </li></ul></ul><ul><ul><li>Encryption and authentication </li></ul></ul><ul><ul><li>User interfaces </li></ul></ul><ul><ul><li>Cryptographic protocols </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 6. <ul><li>Privacy Violation Detection </li></ul><ul><ul><li>Real-time detection </li></ul></ul><ul><ul><li>Batch-mode detection </li></ul></ul><ul><ul><li>Auditing </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 7. <ul><li>Verification and Certification </li></ul><ul><ul><li>Precise semantics of mechanisms on blue layers </li></ul></ul><ul><ul><li>Formal notion of &quot;privacy&quot; </li></ul></ul><ul><ul><li>Evaluation criteria </li></ul></ul><ul><ul><li>Static analysis and formal verification of processes </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  • 8. <ul><li>Limitations </li></ul><ul><ul><li>Need policies balancing privacy desires and information needs. </li></ul></ul><ul><ul><li>Many processes need detailed personal information. </li></ul></ul><ul><li>Exposures </li></ul><ul><ul><li>Once information is released, misuse cannot be prevented, often not even detected, and not taken back. </li></ul></ul><ul><ul><li>Often, illegal collection of personal information cannot be prevented. </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology

×