SlideShare a Scribd company logo
1 of 20
Privacy-friendlybut secureaccess control via mobile devices 
Bart De Decker 
KU Leuven, iMinds-DistriNetCelestijnenlaan 200A, 3001 Heverlee 
e-mail:Bart (DOT) DeDecker (AT) cs (DOT) kuleuven (DOT) be 
URL:mobcom.org
Overview 
•Context: MobCom project 
•Data minimization 
•Objections 
•Framework 
•Evaluation 
•Conclusion
Context
Context: Project goals 
Privacy 
Data minimization 
Unlinkability 
Assurance 
Trustworthiness of data 
Customization 
Less personal data 
Crime/abuse 
Prevention / detection / punishment
Data minimization 
•Minimize disclosure of personal data 
•Avoid “traces” 
–Difficult to erase 
OfflineDigital/Online
Data minimization 
•Authorized users Identified users 
•Anonymous credentials 
–“Prove” ownership 
–Selective disclosure 
–Unlinkable 
•Examples: 
–Idemix (IBM) 
–U-Prove (MS) 
Name 
= 
Birth date 
= 1973/01/26 
Subscription= 31/12/2014
Data minimization 
Signed by XYZ 
Birthdate before 27/11/1996 
Subscription after 1/12/2014 
User to mobileauthentication
Objections 
•Customization? 
•Abuse? 
•Loyalty?
Objection I: Customization 
•We need to know our customers 
–Large profiles 
•Protection 
•Liabilities 
–Data mining 
–Monetizationof customer data
Solution I: Customization 
•Local profiles 
–Cover more 
–User in control 
–Avoid cold start 
–If needed: Pseudonym
Objection II: Abuse 
•Anonymity provokes abuse 
–Abuse the infrastucture 
–Money laundring 
–...
Solution II: Anti-Abuse 
•Prevention 
•Pseudonymity 
•Deanonymization
Objection III: Loyalty 
•Reward recurrent behaviour ?
Solution III: uCentives 
•= Micro-incentive 
–Anonymous 
–Bound to the user’s identity 
–Redeem: Prove “ownership” 
Value 
Exp. date
Framework 
•SW developers security/privacy experts 
•Security/privacy often “afterthought” 
•Framework 
–Technology-agnostic 
–Policy-driven 
–[Context-aware] 
–Separation of Concerns 
•SW developer, Service provider, Technology provider, User
Framework
Evaluation 
inShopnito 
•Shopping assistant 
avisPoll 
•Anonymous but Verifiable, Internet Service POLL System
Invitation 
•Hands-on session (PriMan Framework) 
–When: Tue Dec 16, 13:30 –17:00 
–Where: KU Leuven, Dept. Computer Science 
–URL: mobcom.org/announcements/priman-workshop 
•Closing workshop MobCom & SecureApps 
–When: Wed Dec 17, 9:45 –17:30 
–Where: Faculty Club, Leuven 
–URL: mobcom.org/announcements/closing-workshop
Conclusion 
•Mobile privacy-friendly AC is feasible 
–Local profiles customization 
–Combat Abuse 
–Loyalty rewarded “anonymously” 
•Framework allows for easy integration 
–Separation of concerns 
•Efficient
Q&A

More Related Content

What's hot

Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...FinTech Belgium
 
Invisible Architectures - Supporting Public-Facing Technologies
Invisible Architectures - Supporting Public-Facing TechnologiesInvisible Architectures - Supporting Public-Facing Technologies
Invisible Architectures - Supporting Public-Facing TechnologiesJane Alexander
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Marlon Domingus
 
Blockcircus Hackathon --> The Mesh Team
Blockcircus Hackathon --> The Mesh TeamBlockcircus Hackathon --> The Mesh Team
Blockcircus Hackathon --> The Mesh Teamnazlitemu
 

What's hot (8)

Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
 
Invisible Architectures - Supporting Public-Facing Technologies
Invisible Architectures - Supporting Public-Facing TechnologiesInvisible Architectures - Supporting Public-Facing Technologies
Invisible Architectures - Supporting Public-Facing Technologies
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.
 
Blockcircus Hackathon --> The Mesh Team
Blockcircus Hackathon --> The Mesh TeamBlockcircus Hackathon --> The Mesh Team
Blockcircus Hackathon --> The Mesh Team
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 

Similar to Privacy-friendly mobile access control

Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
information security importance and use.ppt
information security importance and use.pptinformation security importance and use.ppt
information security importance and use.pptMuhammadAbdullah311866
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesPrakhyath Rai
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!Kevin Fisher
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...i_scienceEU
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Online architectures
Online architecturesOnline architectures
Online architecturesaladanh22
 

Similar to Privacy-friendly mobile access control (20)

Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
information security importance and use.ppt
information security importance and use.pptinformation security importance and use.ppt
information security importance and use.ppt
 
Lecture15.ppt
Lecture15.pptLecture15.ppt
Lecture15.ppt
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
 
Online architectures
Online architecturesOnline architectures
Online architectures
 

More from Mobile Convention

Mobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile First Will Not Be Enough | Forrester at Mobile Convention ParisMobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile First Will Not Be Enough | Forrester at Mobile Convention ParisMobile Convention
 
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
The Future of Mobile Security | Kimo Quaintance at Mobile Convention ParisThe Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
The Future of Mobile Security | Kimo Quaintance at Mobile Convention ParisMobile Convention
 
F**ck the change | Stefanie Palomino at Mobile Convention London 2016
F**ck the change | Stefanie Palomino at Mobile Convention London 2016F**ck the change | Stefanie Palomino at Mobile Convention London 2016
F**ck the change | Stefanie Palomino at Mobile Convention London 2016Mobile Convention
 
Size Doesn't Matter | Twitter at Mobile Convention London 2016
Size Doesn't Matter | Twitter at Mobile Convention London 2016 Size Doesn't Matter | Twitter at Mobile Convention London 2016
Size Doesn't Matter | Twitter at Mobile Convention London 2016 Mobile Convention
 
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...Mobile Convention
 
Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobility Past, Present & Future - A personal journey through time | Mobile Co...Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobility Past, Present & Future - A personal journey through time | Mobile Co...Mobile Convention
 
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...Mobile Convention
 
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...Mobile Convention
 
Mobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention Brussels 2014 - InBeacon - Remco BronMobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention Brussels 2014 - InBeacon - Remco BronMobile Convention
 
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch Mobile Convention
 
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention
 
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.comMobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.comMobile Convention
 
Mobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention Brussels 2014 - Filip Nuytemans UberMobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention Brussels 2014 - Filip Nuytemans UberMobile Convention
 
Mobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention Brussels 2014 - Benjamin TysebaertMobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention Brussels 2014 - Benjamin TysebaertMobile Convention
 
Mobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention Brussels 2014 - Tom van den BroekMobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention Brussels 2014 - Tom van den BroekMobile Convention
 
Mobile Convention Brussels 2014 - Filip Gossele
Mobile Convention Brussels 2014 - Filip GosseleMobile Convention Brussels 2014 - Filip Gossele
Mobile Convention Brussels 2014 - Filip GosseleMobile Convention
 
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention
 
Mobile Convention Brussels 2014 - Stéphane Coruble
Mobile Convention Brussels 2014 - Stéphane CorubleMobile Convention Brussels 2014 - Stéphane Coruble
Mobile Convention Brussels 2014 - Stéphane CorubleMobile Convention
 
Mobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention Brussels 2014 - Chris HeilmannMobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention Brussels 2014 - Chris HeilmannMobile Convention
 
Mobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention Brussels 2014 - Jeroen LemaireMobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention Brussels 2014 - Jeroen LemaireMobile Convention
 

More from Mobile Convention (20)

Mobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile First Will Not Be Enough | Forrester at Mobile Convention ParisMobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile First Will Not Be Enough | Forrester at Mobile Convention Paris
 
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
The Future of Mobile Security | Kimo Quaintance at Mobile Convention ParisThe Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
 
F**ck the change | Stefanie Palomino at Mobile Convention London 2016
F**ck the change | Stefanie Palomino at Mobile Convention London 2016F**ck the change | Stefanie Palomino at Mobile Convention London 2016
F**ck the change | Stefanie Palomino at Mobile Convention London 2016
 
Size Doesn't Matter | Twitter at Mobile Convention London 2016
Size Doesn't Matter | Twitter at Mobile Convention London 2016 Size Doesn't Matter | Twitter at Mobile Convention London 2016
Size Doesn't Matter | Twitter at Mobile Convention London 2016
 
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
 
Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobility Past, Present & Future - A personal journey through time | Mobile Co...Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobility Past, Present & Future - A personal journey through time | Mobile Co...
 
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
 
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
 
Mobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention Brussels 2014 - InBeacon - Remco BronMobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention Brussels 2014 - InBeacon - Remco Bron
 
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
 
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul Skeldon
 
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.comMobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
 
Mobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention Brussels 2014 - Filip Nuytemans UberMobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention Brussels 2014 - Filip Nuytemans Uber
 
Mobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention Brussels 2014 - Benjamin TysebaertMobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention Brussels 2014 - Benjamin Tysebaert
 
Mobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention Brussels 2014 - Tom van den BroekMobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention Brussels 2014 - Tom van den Broek
 
Mobile Convention Brussels 2014 - Filip Gossele
Mobile Convention Brussels 2014 - Filip GosseleMobile Convention Brussels 2014 - Filip Gossele
Mobile Convention Brussels 2014 - Filip Gossele
 
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo Quaintance
 
Mobile Convention Brussels 2014 - Stéphane Coruble
Mobile Convention Brussels 2014 - Stéphane CorubleMobile Convention Brussels 2014 - Stéphane Coruble
Mobile Convention Brussels 2014 - Stéphane Coruble
 
Mobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention Brussels 2014 - Chris HeilmannMobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention Brussels 2014 - Chris Heilmann
 
Mobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention Brussels 2014 - Jeroen LemaireMobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention Brussels 2014 - Jeroen Lemaire
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (7)

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 

Privacy-friendly mobile access control

  • 1. Privacy-friendlybut secureaccess control via mobile devices Bart De Decker KU Leuven, iMinds-DistriNetCelestijnenlaan 200A, 3001 Heverlee e-mail:Bart (DOT) DeDecker (AT) cs (DOT) kuleuven (DOT) be URL:mobcom.org
  • 2. Overview •Context: MobCom project •Data minimization •Objections •Framework •Evaluation •Conclusion
  • 4. Context: Project goals Privacy Data minimization Unlinkability Assurance Trustworthiness of data Customization Less personal data Crime/abuse Prevention / detection / punishment
  • 5. Data minimization •Minimize disclosure of personal data •Avoid “traces” –Difficult to erase OfflineDigital/Online
  • 6. Data minimization •Authorized users Identified users •Anonymous credentials –“Prove” ownership –Selective disclosure –Unlinkable •Examples: –Idemix (IBM) –U-Prove (MS) Name = Birth date = 1973/01/26 Subscription= 31/12/2014
  • 7. Data minimization Signed by XYZ Birthdate before 27/11/1996 Subscription after 1/12/2014 User to mobileauthentication
  • 9. Objection I: Customization •We need to know our customers –Large profiles •Protection •Liabilities –Data mining –Monetizationof customer data
  • 10. Solution I: Customization •Local profiles –Cover more –User in control –Avoid cold start –If needed: Pseudonym
  • 11. Objection II: Abuse •Anonymity provokes abuse –Abuse the infrastucture –Money laundring –...
  • 12. Solution II: Anti-Abuse •Prevention •Pseudonymity •Deanonymization
  • 13. Objection III: Loyalty •Reward recurrent behaviour ?
  • 14. Solution III: uCentives •= Micro-incentive –Anonymous –Bound to the user’s identity –Redeem: Prove “ownership” Value Exp. date
  • 15. Framework •SW developers security/privacy experts •Security/privacy often “afterthought” •Framework –Technology-agnostic –Policy-driven –[Context-aware] –Separation of Concerns •SW developer, Service provider, Technology provider, User
  • 17. Evaluation inShopnito •Shopping assistant avisPoll •Anonymous but Verifiable, Internet Service POLL System
  • 18. Invitation •Hands-on session (PriMan Framework) –When: Tue Dec 16, 13:30 –17:00 –Where: KU Leuven, Dept. Computer Science –URL: mobcom.org/announcements/priman-workshop •Closing workshop MobCom & SecureApps –When: Wed Dec 17, 9:45 –17:30 –Where: Faculty Club, Leuven –URL: mobcom.org/announcements/closing-workshop
  • 19. Conclusion •Mobile privacy-friendly AC is feasible –Local profiles customization –Combat Abuse –Loyalty rewarded “anonymously” •Framework allows for easy integration –Separation of concerns •Efficient
  • 20. Q&A