Atjaunināt sīkdatņu piekrišanu

E-grāmata: Digital Privacy: PRIME - Privacy and Identity Management for Europe

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 6545
  • Izdošanas datums: 12-Apr-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642190506
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 6545
  • Izdošanas datums: 12-Apr-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642190506

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book covers the outcome of a four-year European Community FP-VI PRIME Project on privacy-enhancing identity management techniques and systems supporting the sovereignty of users over their private sphere, and enterprises' privacy-compliant data processing.

This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science.  PRIME has focused on privacy-enhancing identity management techniques and systems to support users' sovereignty over their personal privacy and enterprises' privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: Introductory summary, legal, social, and economic aspects, realization of privacy-enhancing user-centric identity management, exploitation of PRIME results for applications, conclusions drawn and an outlook on future work.As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy.
Part I Privacy and Identity Management
1 An Introduction to Privacy-Enhancing Identity Management
3(24)
Jan Camenisch
Ronald Leenes
Marit Hansen
Jan Schallabock
1.1 Motivation
4(2)
1.2 A Scenario -- Alice Goes Shopping
6(1)
1.3 PRIME Enabled Shopping
7(10)
1.3.1 Phase 1: Buyer Beware
8(1)
1.3.2 Phase 2: Pre-sales -- Starting from Maximum Privacy
9(1)
1.3.3 Phase 3: Ordering- Informed Consent and Purpose Limitation
10(3)
1.3.4 Phase 4: After-Sales and Delivery -- Retaining Control: Policy Enforcement
13(1)
1.3.5 Phase 5: Customer Relationship -- Building the Relationship
14(1)
1.3.6 Phase 6: Beyond Being a Connoisseur -- Alice's Other Identities
15(2)
1.4 The Bigger Picture
17(3)
1.4.1 Concepts and Human-Computer Interaction
18(1)
1.4.2 Public Awareness
18(1)
1.4.3 Economics
19(1)
1.4.4 Reaching Out
20(1)
1.5 Requirements for Identity Management Systems
20(7)
References
23(4)
Part II Setting the Stage
2 Overview and Introduction Part II
27(6)
Ronald Leenes
2.1 Introduction
27(2)
2.2 An Approach From Three Perspectives
29(1)
2.3 Structure Part II
30(3)
3 The Identity Landscape
33(20)
Bart Priem
Ronald Leenes
Eleni Kosta
Aleksandra Kuczerawy
3.1 Introduction
33(1)
3.2 The Concept of (Online) Identity
34(1)
3.3 Asymmetric Perspectives
35(3)
3.3.1 The Enterprise-Centric View on Identity Management
35(1)
3.3.2 A User-Centric View on Identity Management
36(1)
3.3.3 Combining the Perspectives
37(1)
3.4 Evolving Identity Management Systems
38(2)
3.5 Existing Identity Management Applications
40(3)
3.5.1 Microsoft Passport
40(1)
3.5.2 Liberty Alliance
41(1)
3.5.3 OpenID
42(1)
3.5.4 Microsoft Cardspace
42(1)
3.5.5 Other IdM Systems
43(1)
3.6 Complicating the Online Identity Landscape
43(7)
3.6.1 The Internet as a Social Environment
44(1)
3.6.2 Customer Empowerment
44(1)
3.6.3 Identity-Related Crime and Misbehaviour
45(1)
3.6.4 The Expanding Internet: Always-On and Everywhere
46(1)
3.6.5 The Internet of Things and the Citizens of Tomorrow
47(1)
3.6.6 Identifying the Individual in the Era of the Internet of Things
48(2)
3.7 Conclusion
50(3)
4 The Need for Privacy-Enhancing Identity Management
53(20)
Bart Priem
Ronald Leenes
Alea Fairchild
Eleni Kosta
4.1 Introduction
53(1)
4.2 Individual Perspective
54(6)
4.2.1 Power Imbalance
55(2)
4.2.2 Relations
57(1)
4.2.3 Personal Development
58(1)
4.2.4 Behaviour, Health, and Emotions
59(1)
4.3 Organisational Perspective
60(4)
4.3.1 Business
60(3)
4.3.2 Government Services
63(1)
4.4 Societal Perspective
64(6)
4.4.1 The Determination of Privacy in Social Context
65(1)
4.4.2 The Contribution of Privacy-Enhanced IdM to Society
66(4)
4.5 Conclusion
70(3)
5 Regulating Identity Management
73(18)
Eleni Kosta
Aleksandra Kuczerawy
Ronald Leenes
Jos Dumortier
5.1 Introduction
73(1)
5.2 A Brief History of European Data Protection Regulation
74(5)
5.2.1 The EU Data Protection Directive
76(2)
5.2.2 The ePrivacy Directive
78(1)
5.2.3 Other Relevant Directives
79(1)
5.3 Principles of Data Processing
79(7)
5.3.1 Principles on Processing of Personal Data
80(3)
5.3.2 Rights of the Data Subject
83(2)
5.3.3 Specific Requirements for Electronic Communications Systems or Applications
85(1)
5.4 Applicability Issues of the Current Legal Framework
86(3)
5.4.1 An Old Directive for New Technologies
86(1)
5.4.2 The Role of the ePrivacy Directive with Regard to the Challenges Posed by New Technologies
87(2)
5.5 Conclusion
89(2)
6 User-Centric Privacy-Enhancing Identity Management
91(16)
Bart Priam
Eleni Kosta
Aleksandra Kuczerawy
Jos Dumortier
Ronald Leenes
6.1 Introduction
91(1)
6.2 Sources of the User-Perspective Requirements
92(13)
6.2.1 Audience Segregation
92(2)
6.2.2 User Control
94(8)
6.2.3 Adoption of Privacy-Enhanced IdM in Society
102(3)
6.3 Conclusions
105(2)
7 Privacy-Enhancing Identity Management in Business
107(34)
Alea Fairchild
Piet Ribbers
7.1 Introduction
107(1)
7.2 Business Model for Privacy Enhancement
108(16)
7.2.1 Privacy Adoption Drivers
108(5)
7.2.2 Process Maturity for Privacy
113(7)
7.2.3 Risk Analysis for Data Privacy
120(2)
7.2.4 Privacy Impact on Business Process Design
122(2)
7.3 Cost Benefit Analysis of Privacy
124(3)
7.4 Requirements from a Business Perspective
127(2)
7.5 Conclusion
129(12)
References
131(10)
Part III What Technology Can Do for Privacy and How
8 Introduction: Privacy, Trust, and Identity Management
141(10)
Stephen Crane
Siani Pearson
Dieter Sommer
8.1 Trust
142(5)
8.1.1 Analysis of Trust
143(1)
8.1.2 Establishing Trust and Managing Privacy
144(1)
8.1.3 Understanding Trust
144(3)
8.2 Structure
147(4)
9 Architecture
151(138)
Dieter Sommer
9.1 Introduction
151(7)
9.1.1 Motivation and Goals
151(2)
9.1.2 Realizing the Goals: Technology
153(3)
9.1.3 Related Work
156(2)
9.1.4 Outline
158(1)
9.2 Architecture Overview
158(15)
9.2.1 One Party in the System
158(1)
9.2.2 Parties and Interactions
159(4)
9.2.3 Data
163(7)
9.2.4 Components
170(3)
9.3 Data Model
173(26)
9.3.1 Identity
174(2)
9.3.2 Constants
176(1)
9.3.3 Formulae in First-Order Logic
176(1)
9.3.4 Predicates
177(1)
9.3.5 Connectives
177(1)
9.3.6 Subject
178(1)
9.3.7 Identifier Objects
179(2)
9.3.8 Certification Metadata
181(1)
9.3.9 Conditional Release
182(2)
9.3.10 Anonymity Revocation
184(1)
9.3.11 Typing
184(4)
9.3.12 Automated Reasoning
188(3)
9.3.13 Requests of Data
191(3)
9.3.14 Matching Data against Requests
194(2)
9.3.15 Further Discussion
196(3)
9.4 Data Representation Based on Our Model
199(11)
9.4.1 Identifier Relationships
200(1)
9.4.2 Identity Relationships
201(5)
9.4.3 Data Track
206(2)
9.4.4 Profile Data
208(1)
9.4.5 Data Statements and Requests
209(1)
9.5 Identity Management Concepts
210(2)
9.5.1 Partial Identities
210(2)
9.6 Data Exchange Architecture
212(30)
9.6.1 Roles in an Attribute Exchange Scenario
214(1)
9.6.2 Private Certificate Systems
215(1)
9.6.3 High-Level Architecture
216(1)
9.6.4 Component Interlace
217(17)
9.6.5 Components
234(3)
9.6.6 Aspects of System Architecture
237(5)
9.7 Authorization Policies
242(18)
9.7.1 Paradigms of Authorization Systems
242(1)
9.7.2 Our Approach
243(1)
9.7.3 Language Basics
244(1)
9.7.4 Language Extensions
245(6)
9.7.5 Rule Composition
251(1)
9.7.6 Associating Policies with Resources
252(6)
9.7.7 Architectural Integration
258(2)
9.8 Data Handling Policies
260(11)
9.8.1 Model
260(4)
9.8.2 Association of Policies with Data
264(3)
9.8.3 Policy Negotiation
267(3)
9.8.4 Concrete Realization in the PRIME Prototype
270(1)
9.9 Negotiation -- Exchange of Data
271(14)
9.9.1 Overview
272(2)
9.9.2 Negotiation Model
274(2)
9.9.3 Policy-Driven Negotiation
276(1)
9.9.4 A Round of Negotiation
277(8)
9.10 Conclusions
285(4)
9.10.1 Key Contributions
285(1)
9.10.2 Experience
286(3)
10 Pseudonyms and Private Credentials
289(20)
Jan Camenisch
Markulf Kohlweiss
Dieter Sommer
10.1 Introduction
289(1)
10.2 The Idemix Private Credential System
290(2)
10.2.1 Basic Principles of Strong Authentication
290(1)
10.2.2 Balancing Anonymity and Accountability
291(1)
10.3 The Idemix System
292(8)
10.3.1 Required Properties When Showing a Certificate
292(2)
10.3.2 Cryptographic Primitives
294(3)
10.3.3 Cryptography for the Controlled Release of Certified Data
297(3)
10.1 Building Applications Using Idemix
300(8)
10.4.1 An Anonymous Credential System
300(2)
10.4.2 Anonymity Revocation
302(1)
10.4.3 Balancing Anonymity and Accountability Using e-Cash Techniques
303(2)
10.4.4 Application Scenarios
305(3)
10.5 Historical Notes
308(1)
11 Privacy Models and Languages: Access Control and Data Handling Policies
309(22)
Claudia Agostino Ardagna
Sabrina De Capitani di Vimercati
Pierangela Samarati
11.1 Introduction
309(1)
11.2 Privacy Policy Categories
310(1)
11.3 Scenario
311(2)
11.4 Access Control Model and Language
313(7)
11.4.1 Basic Concepts
313(2)
11.4.2 Functionalities
315(1)
11.4.3 Description of the Access Control Language
316(4)
11.5 Data Handling Model and Language
320(6)
11.5.1 Description of the Data Handling Language
322(4)
11.6 Related Work
326(3)
11.7 Conclusions
329(2)
12 Privacy Models and Languages: Obligation Policies
331(32)
Marco Casassa Mont
12.1 Introduction to Privacy Obligation Policies
331(1)
12.2 Analysis of Privacy Obligations
332(4)
12.3 Requirements and Constraints
336(3)
12.4 Model of Privacy Obligations
339(7)
12.4.1 Conceptual View
340(1)
12.4.2 Formal View
341(1)
12.4.3 Operational View
342(3)
12.4.4 Relationships with AC/DHP Policies
345(1)
12.5 Privacy Obligation Policies: Language
346(6)
12.6 Parametric Obligation Policies
352(9)
12.6.1 Parametric Obligation Policies: Model
353(2)
12.6.2 Parametric Obligation Policies: Reference Scenario
355(1)
12.6.3 Parametric Obligation Policies: Language
355(6)
12.7 Discussion
361(1)
12.8 Next Steps and Future R&D Work
361(2)
13 Privacy Models and Languages: Assurance Checking Policies
363(14)
Siani Pearson
13.1 Introduction
363(2)
13.1.1 Principles
364(1)
13.1.2 Natural Language Examples
364(1)
13.1.3 Overview of Different Potential Approaches
365(1)
13.2 Defining Trust Constraints: A Lower Level Representation
365(3)
13.3 Defining Clauses as First Class Objects: A Higher-Level Representation
368(5)
13.3.1 Conceptual View
368(2)
13.3.2 Examples of Clauses
370(1)
13.3.3 Formal View
371(1)
13.3.4 Operational View
371(1)
13.3.5 Representation of Assurance Policies in XML Format
372(1)
13.4 Analysis
373(2)
13.5 Next Steps and Future R&D Work
375(2)
14 Privacy-Aware Access Control System: Evaluation and Decision
377(20)
Claudia Agostino Ardagna
Sabrina De Capitani di Vimercati
Eros Pedrini
Pierangela Samarati
14.1 Introduction
377(2)
14.2 Interplay between Parties
379(2)
14.3 A Privacy-Aware Access Control Architecture
381(3)
14.3.1 Access Control Decision Function
381(2)
14.3.2 Policy Management
383(1)
14.4 Policy Evaluation
384(1)
14.5 A Privacy-Aware Access Control System Prototype
385(4)
14.5.1 ACDF Prototype
386(2)
14.5.2 PM Prototype
388(1)
14.6 Performance Analysis
389(5)
14.6.1 The Evaluation Flow
390(1)
14.6.2 Performance Results
391(3)
14.7 Conclusions
394(3)
15 Privacy-Aware Identity Lifecycle Management
397(30)
Marco Casassa Mont
15.1 Privacy-Aware Identity Lifecycle Management: Principles and Concepts
397(2)
15.1.1 Obligation Management Framework
397(2)
15.2 Obligation Management System
399(22)
15.2.1 Design Rationale
399(1)
15.2.2 System Architecture
400(4)
15.2.3 Implementation Details
404(7)
15.2.4 Interaction Flow
411(2)
15.2.5 Event Management Framework
413(1)
15.2.6 Data Repository
414(3)
15.2.7 Administration GUI
417(4)
15.2.8 Discussion
421(1)
15.3 Scalable Obligation Management System
421(5)
15.3.1 Scalable Obligation Management Framework
421(2)
15.3.2 System Architecture
423(3)
15.4 Discussion and Conclusions
426(1)
16 Privacy Assurance Checking
427(30)
Siani Pearson
Tariq Elahi
16.1 Introduction
427(6)
16.1.1 Scenarios Considered
429(1)
16.1.2 How Assurance Checking Fits in with the PRIME Approach
430(2)
16.1.3 Assurance Control Framework: Overview
432(1)
16.2 Privacy Compliance Checking System
433(19)
16.2.1 Design Rationale
433(1)
16.2.2 Architecture
433(4)
16.2.3 Key Interfaces
437(4)
16.2.4 Implementation Details
441(2)
16.2.5 Mapping and Capability Validation
443(2)
16.2.6 Description of Protocol
445(4)
16.2.7 Role of Third Parties within the Trust Chain
449(2)
16.2.8 Extension to B2B Scenarios
451(1)
16.3 Comparison with Related Work
452(3)
16.4 Next Steps and Future R&D Work
455(1)
16.5 Conclusions
455(2)
17 Security/Trustworthiness Assessment of Platforms
457(28)
Stephen Crane
Siani Pearson
17.1 Introduction
457(1)
17.2 Assessment of Trust
457(5)
17.2.1 Trust in an Organisation
458(1)
17.2.2 Trust
459(1)
17.2.3 Determining Trustworthiness
459(3)
17.2.4 Summary
462(1)
17.3 Assessing the Impact of Computer Systems in Relation to On-Line Trust
462(3)
17.3.1 Analysis of Online Trust
462(1)
17.3.2 How On-Line Trust Is Underpinned by Social and Technological Mechanisms
463(1)
17.3.3 Summary
464(1)
17.4 Deploying Trusted Technologies
465(4)
17.4.1 Trusted Computing Technology
465(1)
17.4.2 How Trusted Platforms Can Provide Persistent and Dynamic Trust
466(2)
17.4.3 Summary
468(1)
17.5 Use of Trusted Computing to Enhance Privacy
469(8)
17.5.1 Introduction
469(1)
17.5.2 How Trusted Computing Platform Technology Can Enhance Privacy
469(1)
17.5.3 Privacy Enhancing Safeguards of Trusted Computing Technology
470(2)
17.5.4 How Such Building Blocks Can Be Used
472(2)
17.5.5 Potential Negative Privacy Implications of Trusted Computing
474(2)
17.5.6 Concluding Remarks
476(1)
17.6 PRIME Platform Trust Manager (PTM)
477(5)
17.6.1 Trust Handler (TH)
480(1)
17.6.2 Trust Real-Time Monitor (TRM)
480(1)
17.6.3 Platform Trust Status (PTS)
480(1)
17.6.4 Trust Communicator (TC)
481(1)
17.6.5 Reputation Manager (RM)
482(1)
17.6.6 Trust Wrapper (TW)
482(1)
17.7 Reputation Management
482(1)
17.7.1 Objective Reputation Assessment
482(1)
17.7.2 Privacy Preferences and Privacy Obligations
483(1)
17.8 Conclusions
483(2)
18 Further Privacy Mechanisms
485(72)
Anas Abou El Kalam
Carlos Aguilar Melchor
Stefan Berthold
Jan Camenisch
Sebastian Clauß
Yves Deswarte
Markulf Kohlweiss
Andriy Panchenko
Lexi Pimenidis
Matthieu Roy
18.1 Privacy Measures
185(317)
18.1.1 Formal Methods
487(3)
18.1.2 Persistent Data and Statistical Databases
490(2)
18.1.3 Data-Flow in Networks
492(2)
18.1.4 Generalizations
494(8)
18.2 Data Anonymization
502(19)
18.2.1 Introduction
502(2)
18.2.2 Analysis of Some Anonymization Examples in Europe and the USA
504(6)
18.2.3 Requirements for a Suitable Implementation
510(5)
18.2.4 A Generic Anonymization Architecture
515(3)
18.2.5 Implementation
518(1)
18.2.6 Discussion
519(1)
18.2.7 Conclusions
520(1)
18.3 Anonymous Communication
521(22)
18.3.1 Scenario
522(4)
18.3.2 Techniques find Approaches
526(14)
18.3.3 Threats in Anonymous Communication
540(3)
18.3.4 Legal Issues
543(1)
18.4 Unobsaervable Content Access
543(14)
18.4.1 Private Information Retrieval and Oblivious Transfer
545(1)
18.4.2 Access Control for Unobservable Services
546(1)
18.4.3 Location-Based Services
547(8)
18.4.4 Conclusion and PRIME Perspective
555(2)
19 Reputation Management as an Extension of Future Identity Management
557(12)
Sandra Steinbrecher
Franziska Pingel
Andreas Juschka
19.1 Introduction
557(2)
19.2 Model of Reputation Systems
559(4)
19.2.1 Reputation
559(1)
19.2.2 Reputation Network
560(3)
19.3 Reputation within BluES'n
563(2)
19.3.1 Characteristics of a Reputation System in the Context of Collaborative eLearning
563(1)
19.3.2 Basic Design of the Reputation System
563(2)
19.4 Reputation as Service for PRIME Applications
565(3)
19.4.1 Necessary Infrastructure
565(1)
19.4.2 System Design
566(2)
19.5 Outlook
568(1)
20 Human-Computer Interaction
569(28)
Simone Fischer- Hubner
John Soren Pettersson
Mike Bergmann
Marit Hansen
Siani Pearson
Marco Casassa Mont
20.1 Introduction
509(61)
20.2 Related Work
570(3)
20.2.1 User-Friendly Representation of Policy Management with the Help of Default Settings
571(1)
20.2.2 Secure Interfaces
571(1)
20.2.3 Mapping Legal Privacy Requirements
572(1)
20.2.4 Mediation of Trust
573(1)
20.3 Challenge I: User-Friendly Representation of Complex PET Concepts
573(8)
20.3.1 Simplified Policy Handling
574(3)
20.3.2 UI Paradigms for Presenting Privacy Preferences
577(4)
20.4 Challenge II: Secure Interfaces
581(1)
20.5 Challenge III: Mapping Legal Privacy Requirements
582(9)
20.5.1 Obtaining Informed Consent
582(5)
20.5.2 Enhancing Transparency
587(4)
20.6 Challenge IV: Mediation of Trust
591(2)
20.7 Outlook
593(4)
20.7.1 Disclosing Data Using Anonymous Credentials
593(1)
20.7.2 Notification about Incidents
593(1)
20.7.3 Linkability Computation
594(1)
20.7.4 How Ontologies Can Be Utilised for UI Design
594(3)
21 Technology Assurance
597(12)
Tobias Schemer
Lothar Fritsch
21.1 Introduction
597(2)
21.1.1 Cost of Testing
598(1)
21.1.2 Common Criteria
599(1)
21.2 Early Security Validation with CC
599(8)
21.2.1 Evaluation and the Common Criteria
599(1)
21.2.2 Basic Preconditions for an Evaluation
600(1)
21.2.3 Implemented Security Functions
601(1)
21.2.4 Threat Analysis
601(1)
21.2.5 Test Plans
602(1)
21.2.6 The Documentation of the Test Results
603(1)
21.2.7 Evaluation Process
603(1)
21.2.8 Experience with CC-Based Project Evaluation
604(1)
21.2.9 Integrated Prototype
604(1)
21.2.10 LBS Prototype
605(1)
21.2.11 eLearning Prototype
605(2)
21.3 Conclusion
607(2)
22 Requirements for Identity Management from the Perspective of Multilateral Interactions
609(44)
Stefanie Potzsch
Katrin Borcea-Pfitzmann
Marit Hansen
Katja Liesebach
Andreas Pfitzmann
Sandra Steinbrecher
22.1 Introduction
609(2)
22.1.1 Objective of the
Chapter
609(1)
22.1.2 User-Controlled Identity Management: From Chaum to PRIME
610(1)
22.2 Multilateral Interactions Using the Example of a Collaborative eLearning System
611(2)
22.2.1 Multilateral Interactions
611(1)
22.2.2 Stakeholders
611(2)
22.3 Building Blocks of a Privacy-Enhancing Identity Management System for MLI
613(8)
22.3.1 Pseudonyms and Partial Identities
614(1)
22.3.2 Relationship Information
614(1)
22.3.3 Searching for and Finding of Interaction Partners
615(1)
22.3.4 Trust Management and Reputation
616(1)
22.3.5 Awareness Information
617(1)
22.3.6 Context, and History
617(1)
22.3.7 Access Control
618(1)
22.3.8 Negotiation and Enforcement of Privacy Policies and Preferences
619(1)
22.3.9 Workflows and Behaviour Patterns
619(1)
22.3.10 External Regulations
620(1)
22.4 Summary and Outlook
621(32)
22.4.1 Overview of Building Blocks
621(1)
22.4.2 Building Blocks in the Model of David Chaum
622(1)
22.4.3 Research Questions
623(4)
References
627(26)
Part IV PRIME Applied
23 Introduction
653(4)
Pete Bramhall
24 Collaborative E-Learning
657(22)
Katja Liesebach
Elke Franz
Anne-Katrin Stange
Andreas Juschka
Katrin Borcea-Pfitzmann
Alexander Bottcher
Hagen Wahrig
24.1 The Collaborative eLearning System BluES'n
657(4)
24.1.1 Democratisation of an eLearning Environment
657(2)
24.1.2 Need for Privacy and How PRIME Helps
659(2)
24.2 Intra-Application Partitioning of Personal Data
661(4)
24.2.1 Necessity and General Goals
661(1)
24.2.2 Concept for the Support of IAP
662(1)
24.2.3 Realisation within the CeL Prototype
663(1)
24.2.4 Discussion
664(1)
24.3 Policy- and Credential-Based Access Control
665(2)
24.3.1 Necessity for Privacy-Enhancing Access Control
665(1)
24.3.2 Realisation within the CeL Prototype
665(1)
24.3.3 Discussion
666(1)
24.4 Privacy-Aware and Usable Application Design
667(6)
24.4.1 Management of Aliases
668(1)
24.4.2 Chernoff Faces
669(2)
24.4.3 GUI Components: InfoCenter and Echobar
671(1)
24.4.4 Adapted "Send Personal Data"-Dialogue
672(1)
24.5 Summary -- The Final CeL Prototype
673(3)
24.0 Beyond PRIME -- An Outlook
676(3)
25 Location-Based Services
679(18)
Jan Zibuschka
Kai Rannenberg
Tobias Kolsch
25.1 Introduction
679(1)
25.2 Privacy in Location-Based Services
679(2)
25.3 Requirements
681(2)
25.3.1 Business Models
681(1)
25.3.2 Data Protection
682(1)
25.4 The Concept of a Location Intermediary
683(2)
25.5 Prototype Development
685(1)
25.6 PRIME Principles in a Restricted Mobile Environment
686(1)
25.7 First Prototype Version
687(3)
25.7.1 Scenario
687(1)
25.7.2 Implementation
687(3)
25.8 Second Prototype Version
690(2)
25.8.1 Scenario
690(1)
25.8.2 Implementation
690(2)
25.9 Commercialization
692(1)
25.10 Possible Deployment
693(1)
25.11 Outlook
694(3)
26 e-Health
697(24)
Alberto Sauna
Riccardo Serafin
Nicola Maganetti
26.1 Introduction
697(10)
26.1.1 Definition of "Health" by the World Health Organization (WHO)
698(1)
26.1.2 Continuity of Care and Impact on Individual's Life
698(1)
26.1.3 Health and Lifestyle Management
699(1)
20.1.4 The Self Care Medication Regimen and the Opportunity for Privacy-Enhanced Processes and Services
700(6)
26.1.5 Reference Context for Privacy-Enhanced Process and Service Re-engineering Based on the PRIME Concepts Applied to Self Cave Drug Therapy Management
706(1)
26.2 A Healthcare Demonstrator: Objectives and Scenario
707(4)
26.2.1 Objectives
707(1)
26.2.2 Scenario
708(2)
26.2.3 Collaboration with Other European Research Initiatives
710(1)
26.3 Application Requirements
711(2)
26.4 Application Demonstrator Architecture
713(6)
26.4.1 Demonstrator Components
713(1)
20.4.2 Privacy-Enhanced Online Drug Purchase: Information Flow
713(4)
26.4.3 Data Track and Obligations: Ensuring User Control
717(2)
26.5 Conclusion
719(2)
27 Airport Security Controls: Prototype Summary
721(14)
Ioannis Vakalis
27.1 Introduction
721(1)
27.2 The Reason Behind the Prototype
722(1)
27.3 The Trusted Traveler Use Case Scenario
723(1)
27.3.1 Privacy Enhancements
724(1)
27.4 Trusted Traveler "Smart Card" and Data Stored Thereiu
724(1)
27.5 The ASC Prototype Stages
725(10)
27.5.1 The Enrollment
725(2)
27.5.2 Cheek-In
727(1)
27.5.3 Entering the Passenger Restricted Area (PRA)
728(3)
27.5.4 Gate
731(1)
27.5.5 Boarding
732(1)
27.5.6 The Use of Cryptography
733(2)
28 Privacy and Identity Management Requirements: An Application Prototype Perspective
735(24)
Tobias Kolsch
Jan Zibuschka
Kai Rannenberg
28.1 Introduction
735(1)
28.2 Users' Interests and Requirements
736(6)
28.2.1 Data Minimization
736(3)
28.2.2 Control of Data Flow
739(2)
28.2.3 Easy-to-Use Technology
741(1)
28.2.4 Reliable Service Provision
742(1)
28.3 Service Providers' Interests and Requirements
742(3)
28.3.1 Flexible Business Models
743(1)
28.3.2 Customer Loyalty and Trust
743(1)
28.3.3 User Base
743(1)
28.3.4 Trusted Payment Partners
744(1)
28.3.5 Delegation
745(1)
28.3.6 Legal Compliance
745(1)
28.4 Network Operators' Interests and Requirements
745(2)
28.4.1 Flexible Business Models
746(1)
28.4.2 Easy Integration of Third-Party Services
746(1)
28.4.3 Legal Compliance
747(1)
28.4.4 Customer Loyalty and Trust
747(1)
28.4.5 Leveraging Existing Infrastructural Assets
747(1)
28.4.6 Enabling New Applications
747(1)
28.5 Developer Requirements
747(1)
28.5.1 Documentation
747(1)
28.5.2 Lean Interfaces
748(1)
28.5.3 Integration into Existing Frameworks
748(1)
28.6 Conclusion
748(11)
References
751(8)
Part V Conclusion and Outlook
29 Conclusion and Outlook
759(10)
Jan Camenisch
Andreas Pfitzmann
29.1 Conclusion
759(1)
29.2 Outlook
760(9)
29.2.1 Further Research on Identity Management
760(1)
29.2.2 Making Privacy Real
761(1)
29.2.3 Including the Social Value of Privacy
762(1)
29.2.4 Succeeding PRIME
763(2)
References
765(4)
Part VI Appendix
30 XML Schemata
769(6)
30.1 Access Control and Release Language: XML Schema
769(2)
30.2 Data Handling Language: XML Schema
771(4)
Author Index 775