Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled  Services & Applications...
<ul><li>Services & Applications </li></ul><ul><ul><li>Solutions for standard app's </li></ul></ul><ul><ul><ul><li>policy e...
<ul><li>Privacy Management </li></ul><ul><ul><li>Classification and inventory of ( legacy ) data </li></ul></ul><ul><ul><l...
<ul><li>Data Minimization </li></ul><ul><ul><li>Pseudonymity and identity management </li></ul></ul><ul><ul><li>Local/trus...
<ul><li>Security Technology </li></ul><ul><ul><li>Access control (e.g., RBAC, fine-grained, dynamic roles) </li></ul></ul>...
<ul><li>Privacy Violation Detection </li></ul><ul><ul><li>Real-time detection </li></ul></ul><ul><ul><li>Batch-mode detect...
<ul><li>Verification and Certification </li></ul><ul><ul><li>Precise semantics of mechanisms on blue layers </li></ul></ul...
<ul><li>Limitations </li></ul><ul><ul><li>Need policies balancing privacy desires and information needs. </li></ul></ul><u...
Upcoming SlideShare
Loading in...5
×

Privacy Enhancing Technology

329

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
329
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Privacy Enhancing Technology

  1. 1. Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  2. 2. <ul><li>Services & Applications </li></ul><ul><ul><li>Solutions for standard app's </li></ul></ul><ul><ul><ul><li>policy enforcement, auditing </li></ul></ul></ul><ul><ul><li>New paradigms </li></ul></ul><ul><ul><ul><li>federated id mgmt </li></ul></ul></ul><ul><ul><ul><li>privacy rating services </li></ul></ul></ul><ul><ul><ul><li>anonymous payment </li></ul></ul></ul><ul><ul><li>Privacy-friendly business models </li></ul></ul><ul><ul><ul><li>depersonalized analysis </li></ul></ul></ul><ul><ul><ul><li>anonymous transactions </li></ul></ul></ul><ul><ul><li>User models and interfaces </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  3. 3. <ul><li>Privacy Management </li></ul><ul><ul><li>Classification and inventory of ( legacy ) data </li></ul></ul><ul><ul><li>Extensions to databases </li></ul></ul><ul><ul><li>Rich authorization policies </li></ul></ul><ul><ul><li>Enforcement </li></ul></ul><ul><ul><li>Consistent external and internal policies </li></ul></ul><ul><ul><li>Transitivity of policies </li></ul></ul><ul><ul><li>Negotiation of policies </li></ul></ul><ul><ul><li>User interfaces </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  4. 4. <ul><li>Data Minimization </li></ul><ul><ul><li>Pseudonymity and identity management </li></ul></ul><ul><ul><li>Local/trusted computations </li></ul></ul><ul><ul><li>Data transformation </li></ul></ul><ul><ul><ul><li>depersonalization </li></ul></ul></ul><ul><ul><ul><li>anonymization </li></ul></ul></ul><ul><ul><ul><li>aggregation, summary </li></ul></ul></ul><ul><ul><ul><li>randomization </li></ul></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  5. 5. <ul><li>Security Technology </li></ul><ul><ul><li>Access control (e.g., RBAC, fine-grained, dynamic roles) </li></ul></ul><ul><ul><li>Encryption and authentication </li></ul></ul><ul><ul><li>User interfaces </li></ul></ul><ul><ul><li>Cryptographic protocols </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  6. 6. <ul><li>Privacy Violation Detection </li></ul><ul><ul><li>Real-time detection </li></ul></ul><ul><ul><li>Batch-mode detection </li></ul></ul><ul><ul><li>Auditing </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  7. 7. <ul><li>Verification and Certification </li></ul><ul><ul><li>Precise semantics of mechanisms on blue layers </li></ul></ul><ul><ul><li>Formal notion of &quot;privacy&quot; </li></ul></ul><ul><ul><li>Evaluation criteria </li></ul></ul><ul><ul><li>Static analysis and formal verification of processes </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  8. 8. <ul><li>Limitations </li></ul><ul><ul><li>Need policies balancing privacy desires and information needs. </li></ul></ul><ul><ul><li>Many processes need detailed personal information. </li></ul></ul><ul><li>Exposures </li></ul><ul><ul><li>Once information is released, misuse cannot be prevented, often not even detected, and not taken back. </li></ul></ul><ul><ul><li>Often, illegal collection of personal information cannot be prevented. </li></ul></ul>Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×