Privacy Enhancing Technology
Upcoming SlideShare
Loading in...5
×
 

Privacy Enhancing Technology

on

  • 446 views

 

Statistics

Views

Total Views
446
Views on SlideShare
442
Embed Views
4

Actions

Likes
0
Downloads
7
Comments
0

1 Embed 4

http://www.slideshare.net 4

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Privacy Enhancing Technology Privacy Enhancing Technology Presentation Transcript

  • Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
    • Services & Applications
      • Solutions for standard app's
        • policy enforcement, auditing
      • New paradigms
        • federated id mgmt
        • privacy rating services
        • anonymous payment
      • Privacy-friendly business models
        • depersonalized analysis
        • anonymous transactions
      • User models and interfaces
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
    • Privacy Management
      • Classification and inventory of ( legacy ) data
      • Extensions to databases
      • Rich authorization policies
      • Enforcement
      • Consistent external and internal policies
      • Transitivity of policies
      • Negotiation of policies
      • User interfaces
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
    • Data Minimization
      • Pseudonymity and identity management
      • Local/trusted computations
      • Data transformation
        • depersonalization
        • anonymization
        • aggregation, summary
        • randomization
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
    • Security Technology
      • Access control (e.g., RBAC, fine-grained, dynamic roles)
      • Encryption and authentication
      • User interfaces
      • Cryptographic protocols
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
    • Privacy Violation Detection
      • Real-time detection
      • Batch-mode detection
      • Auditing
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
    • Verification and Certification
      • Precise semantics of mechanisms on blue layers
      • Formal notion of "privacy"
      • Evaluation criteria
      • Static analysis and formal verification of processes
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology
    • Limitations
      • Need policies balancing privacy desires and information needs.
      • Many processes need detailed personal information.
    • Exposures
      • Once information is released, misuse cannot be prevented, often not even detected, and not taken back.
      • Often, illegal collection of personal information cannot be prevented.
    Training and Design Tools Privacy Management Privacy-enabling Security Technology Privacy-enabled Services & Applications Privacy Violation Detection Verification and Certification Data Minimization Privacy-enhancing Technology