Introduction |
|
|
|
5 | (28) |
|
|
|
|
|
5 | (2) |
|
1.2 Vision and Objectives of the PrimeLife Project |
|
|
7 | (1) |
|
|
8 | (1) |
|
1.4 From Identity via Identity Management to Privacy by Identity Management |
|
|
9 | (10) |
|
1.4.1 Identity -- What it is |
|
|
10 | (3) |
|
1.4.2 Presentation of Identities -- Pseudonyms |
|
|
13 | (4) |
|
1.4.3 Time Aspects of Identity Management and Privacy |
|
|
17 | (2) |
|
1.5 Further Facets of Privacy |
|
|
19 | (1) |
|
1.6 PrimeLife's Contributions to Protect Privacy |
|
|
20 | (13) |
|
1.6.1 Part I - Privacy in Life |
|
|
22 | (1) |
|
1.6.2 Part II - Mechanisms for Privacy |
|
|
22 | (1) |
|
1.6.3 Part III - Human Computer Interaction (HCI) |
|
|
23 | (1) |
|
1.6.4 Part IV - Policy Languages |
|
|
24 | (1) |
|
1.6.5 Part V- Infrastructures for Privacy and Identity Management |
|
|
25 | (1) |
|
1.6.6 Part VI-Privacy Live |
|
|
25 | (2) |
|
|
27 | (6) |
|
|
|
2 Privacy in Social Software |
|
|
33 | (28) |
|
|
|
|
|
|
2.1 Scenarios and Requirements |
|
|
33 | (4) |
|
2.1.1 Scenario 1: A Social Network Site |
|
|
35 | (1) |
|
2.1.2 Scenario 2: A Forum |
|
|
36 | (1) |
|
2.1.3 General Requirements |
|
|
36 | (1) |
|
2.2 Two Prototypes for Privacy-Enhanced Social Networking |
|
|
37 | (13) |
|
|
37 | (1) |
|
2.2.2 Privacy Issues in Social Network Sites |
|
|
38 | (4) |
|
2.2.3 Clique: An Overview |
|
|
42 | (4) |
|
2.2.4 Scramble!: An Overview |
|
|
46 | (4) |
|
2.3 Privacy-Enhancing Selective Access Control for Forums |
|
|
50 | (9) |
|
|
50 | (1) |
|
2.3.2 Introducing phpBB Forum Software and PRIME Framework |
|
|
51 | (1) |
|
2.3.3 Extending phpBB with Selective Access Control |
|
|
52 | (2) |
|
|
54 | (1) |
|
2.3.5 Privacy-Awareness Information |
|
|
55 | (1) |
|
|
55 | (4) |
|
|
59 | (1) |
|
|
60 | (1) |
|
3 Trustworthiness of Online Content |
|
|
61 | (26) |
|
|
|
|
|
|
|
|
61 | (2) |
|
3.2 Scenarios and requirements |
|
|
63 | (7) |
|
|
63 | (2) |
|
3.2.2 High-level mechanisms |
|
|
65 | (1) |
|
3.2.3 Requirements of mechanisms |
|
|
66 | (4) |
|
|
70 | (6) |
|
3.3.1 Binding metadata to data |
|
|
71 | (3) |
|
3.3.2 User Reputation and Certification |
|
|
74 | (2) |
|
|
76 | (8) |
|
3.4.1 Trustworthy Blogging |
|
|
76 | (2) |
|
3.4.2 Encouraging Comments with Incentives |
|
|
78 | (2) |
|
3.4.3 Author reputation system and trust evaluation of content in MediaWiki |
|
|
80 | (4) |
|
|
84 | (1) |
|
|
85 | (2) |
|
4 Identity and Privacy Issues Throughout Life |
|
|
87 | (30) |
|
|
|
|
|
|
|
|
|
|
4.1 Challenges and Requirements |
|
|
87 | (12) |
|
4.1.1 Dealing with Dynamics |
|
|
87 | (4) |
|
|
91 | (3) |
|
4.1.3 Concepts for Delegation |
|
|
94 | (5) |
|
|
99 | (11) |
|
4.2.1 Overview of the Backup Demonstrator Architecture |
|
|
102 | (7) |
|
4.2.2 Deployment and Usage of the Demonstrator |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (7) |
|
|
111 | (6) |
|
Part II Mechanisms for Privacy |
|
|
|
5 Cryptographic Mechanisms for Privacy |
|
|
117 | (18) |
|
|
|
|
|
|
|
117 | (1) |
|
5.2 Cryptography to the Aid |
|
|
118 | (1) |
|
5.3 Private Credentials, Their Extensions, and Applications |
|
|
119 | (4) |
|
5.3.1 Extended Functionalities |
|
|
120 | (3) |
|
5.3.2 Direct Anonymous Attestation |
|
|
123 | (1) |
|
5.4 Other Privacy-Enhancing Authentication Mechanisms |
|
|
123 | (4) |
|
5.4.1 Privacy-Enhancing Encryption |
|
|
126 | (1) |
|
5.5 Electronic Voting, Polling, and Petitions |
|
|
127 | (1) |
|
5.6 Oblivious Transfer with Access Control and Prices |
|
|
128 | (2) |
|
5.7 Oblivious Trusted Third Parties |
|
|
130 | (4) |
|
|
134 | (1) |
|
|
135 | (10) |
|
|
|
|
|
135 | (2) |
|
|
137 | (1) |
|
6.3 On Privacy Preserving and Secure Logs |
|
|
138 | (1) |
|
6.3.1 Attacker Model and Security Evaluation |
|
|
139 | (1) |
|
6.4 Prior Work and Our Contribution |
|
|
139 | (1) |
|
|
140 | (3) |
|
|
140 | (1) |
|
6.5.2 Entry Structure and Storage |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
6.6 Conclusion and Outlook |
|
|
143 | (2) |
|
7 Interoperability of Trust and Reputation Tools |
|
|
145 | (12) |
|
|
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
7.4 Security and Privacy Requirements |
|
|
148 | (1) |
|
7.5 Technical Implementability |
|
|
149 | (1) |
|
|
150 | (5) |
|
7.6.1 Interoperability with Applications |
|
|
150 | (2) |
|
7.6.2 Interoperability with Trust Management |
|
|
152 | (1) |
|
7.6.3 Interoperability with Identity Management |
|
|
153 | (1) |
|
7.6.4 Resulting implementation |
|
|
154 | (1) |
|
|
155 | (2) |
|
|
157 | (24) |
|
|
Sabrina De Capitani di Vimercati |
|
|
|
|
|
|
|
157 | (1) |
|
8.2 Privacy Metrics and Information Theory |
|
|
158 | (7) |
|
|
159 | (1) |
|
8.2.2 Traditional Privacy Metrics |
|
|
160 | (1) |
|
8.2.3 An Information Theoretic Approach for Privacy Metrics |
|
|
161 | (3) |
|
8.2.4 Protecting Privacy of Sensitive Value Distributions |
|
|
164 | (1) |
|
8.3 Privacy Protection Techniques |
|
|
165 | (2) |
|
|
165 | (2) |
|
8.4 Fragmentation and Encryption |
|
|
167 | (4) |
|
8.4.1 Fragmentation Model |
|
|
168 | (1) |
|
8.4.2 Minimal Fragmentation |
|
|
169 | (1) |
|
|
170 | (1) |
|
8.5 Departing from Encryption |
|
|
171 | (4) |
|
8.5.1 Fragmentation Model |
|
|
172 | (1) |
|
8.5.2 Minimal Fragmentation |
|
|
172 | (2) |
|
|
174 | (1) |
|
8.6 Preserving Utility in Data Publication |
|
|
175 | (4) |
|
8.6.1 Visibility Requirements |
|
|
175 | (1) |
|
|
176 | (3) |
|
|
179 | (2) |
|
9 Selective Exchange of Confidential Data in the Outsourcing Scenario |
|
|
181 | (32) |
|
Sabrina De Capitani di Vimercati |
|
|
|
|
|
|
|
181 | (2) |
|
|
183 | (1) |
|
|
184 | (5) |
|
|
184 | (1) |
|
|
185 | (2) |
|
|
187 | (2) |
|
9.4 Resource Sharing Management |
|
|
189 | (2) |
|
9.5 Comparison with the PGP's Key-Management Su'ategy |
|
|
191 | (1) |
|
|
192 | (2) |
|
|
192 | (2) |
|
9.7 Encryption Policy Updates |
|
|
194 | (4) |
|
9.7.1 Two-Layered Encryption Model |
|
|
195 | (1) |
|
|
196 | (1) |
|
9.7.3 Collusion Evaluation |
|
|
196 | (2) |
|
|
198 | (15) |
|
|
199 | (14) |
|
Part III Human Computer Interaction (HCI) |
|
|
|
|
213 | (8) |
|
|
|
|
213 | (2) |
|
10.2 PET-USES in Practice |
|
|
215 | (2) |
|
10.2.1 When to use the PET-USES |
|
|
216 | (1) |
|
10.2.2 How to use the PET-USES |
|
|
216 | (1) |
|
|
217 | (1) |
|
10.4 Appendix: PET-USES [ 1.0] |
|
|
217 | (4) |
|
|
217 | (4) |
|
11 HCI for PrimeLife Prototypes |
|
|
221 | (12) |
|
|
|
|
|
|
|
221 | (1) |
|
11.2 Overview of HCI challenges |
|
|
222 | (3) |
|
11.2.1 Challenge 1: Limited User Knowledge of PETs |
|
|
222 | (1) |
|
11.2.2 Challenge 2: Technologically Driven Development of PETS |
|
|
223 | (1) |
|
11.2.3 Challenge 3: Understanding PET Related Terms |
|
|
223 | (1) |
|
11.2.4 Challenge 4: Wrong Mental Models of PETs |
|
|
223 | (1) |
|
11.2.5 Challenge 5: Privacy as a Secondary Task |
|
|
224 | (1) |
|
11.2.6 Challenge 6: Complex Mechanisms are Hard to Understand |
|
|
225 | (1) |
|
11.3 Tackling the Challenges |
|
|
225 | (3) |
|
11.3.1 Limited User Knowledge of PETs |
|
|
225 | (1) |
|
11.3.2 Technologically Driven Development of PETs |
|
|
226 | (1) |
|
11.3.3 Understanding of PET Related Terms |
|
|
226 | (1) |
|
11.3.4 Wrong Mental Models of PETs |
|
|
227 | (1) |
|
11.3.5 Privacy as a Secondary Task |
|
|
227 | (1) |
|
11.3.6 Complex Mechanisms are Hard to Understand |
|
|
228 | (1) |
|
11.4 HCI Activities and Software Development |
|
|
228 | (3) |
|
|
228 | (1) |
|
|
229 | (1) |
|
11.4.3 Examples Reflected |
|
|
230 | (1) |
|
11.5 Discussion and Outlook |
|
|
231 | (2) |
|
12 The Users' Mental Models' Effect on their Comprehension of Anonymous Credentials |
|
|
233 | (12) |
|
|
|
|
233 | (3) |
|
12.1.1 Anonymous Credentials |
|
|
234 | (1) |
|
|
235 | (1) |
|
12.2 Performed User Tests |
|
|
236 | (6) |
|
|
236 | (2) |
|
12.2.2 The Card-Based Approach |
|
|
238 | (2) |
|
12.2.3 The Attribute-Based Approach |
|
|
240 | (2) |
|
12.2.4 Results of the User Studies |
|
|
242 | (1) |
|
12.3 Conclusions & Future Work |
|
|
242 | (1) |
|
|
243 | (2) |
|
13 Trust and Assurance HCI |
|
|
245 | (16) |
|
|
|
|
|
245 | (1) |
|
13.2 Social Trust Factors |
|
|
246 | (1) |
|
13.3 A Trust Evaluation Function |
|
|
247 | (6) |
|
13.3.1 Trust Parameters Used |
|
|
247 | (2) |
|
13.3.2 Design Principles and Test Results |
|
|
249 | (2) |
|
|
251 | (2) |
|
|
253 | (7) |
|
13.4.1 Use of the Data Track |
|
|
254 | (2) |
|
13.4.2 Test Scenarios & Test Setups |
|
|
256 | (1) |
|
13.4.3 Results of the Usability Tests |
|
|
257 | (2) |
|
13.4.4 Discussion of Data Track Usability Tests |
|
|
259 | (1) |
|
|
260 | (1) |
|
14 HCI for Policy Display and Administration |
|
|
261 | (18) |
|
|
|
|
|
|
261 | (2) |
|
|
263 | (2) |
|
14.3 User Interfaces for Policy Management and Display |
|
|
265 | (10) |
|
14.3.1 Selecting Privacy Preferences |
|
|
266 | (1) |
|
14.3.2 The "Send Data?" Dialog |
|
|
267 | (6) |
|
14.3.3 Testing the Usability of the "Send Data?" Dialog |
|
|
273 | (2) |
|
14.4 Conclusions and Outlook |
|
|
275 | (4) |
|
|
279 | (16) |
|
|
|
|
|
279 | (1) |
|
15.2 Motivation for Introducing Privacy Icons |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
15.4.1 PrimeLife Icon Set for General Usage |
|
|
281 | (1) |
|
15.4.2 PrimeLife Icon Set for Social Networks |
|
|
282 | (1) |
|
|
282 | (2) |
|
15.6 An Approach for Handling E-mail Data: Privicons |
|
|
284 | (1) |
|
15.7 Conclusions and Outlook |
|
|
285 | (10) |
|
|
287 | (8) |
|
|
|
16 Policy Requirements and State of the Art |
|
|
295 | (18) |
|
|
|
|
295 | (2) |
|
16.1.1 Data Handling Policies |
|
|
295 | (1) |
|
16.1.2 Access Control Policies |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (2) |
|
16.3 Policy Language Requirements |
|
|
299 | (9) |
|
16.3.1 General Design Principles and Expressivity |
|
|
299 | (1) |
|
16.3.2 Requirements for Data Handling Policies |
|
|
300 | (3) |
|
16.3.3 Requirements for Access Control policies |
|
|
303 | (2) |
|
16.3.4 Requirements for Trust policies |
|
|
305 | (2) |
|
16.3.5 Other Technical Requirements for PrimeLife |
|
|
307 | (1) |
|
|
308 | (5) |
|
16.4.1 Access Control Policy Languages |
|
|
308 | (1) |
|
16.4.2 Data Handling Policy Languages |
|
|
309 | (1) |
|
16.4.3 Anonymous Credential Systems and Private Information Management |
|
|
310 | (3) |
|
17 Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage |
|
|
313 | (14) |
|
|
|
|
17.1 Privacy Specifications: Preferences, Policies, and Sticky Policies |
|
|
313 | (2) |
|
17.2 Matching Data Handling |
|
|
315 | (2) |
|
|
315 | (1) |
|
17.2.2 Going Further than Boolean Match |
|
|
316 | (1) |
|
|
317 | (4) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
17.5 Downstream Data Handling |
|
|
321 | (5) |
|
17.5.1 Structure of Downstream Authorisations |
|
|
322 | (1) |
|
17.5.2 Proactive Matching of Downstream Data Handling |
|
|
323 | (1) |
|
17.5.3 Lazy Matching of Downstream Data Handling |
|
|
324 | (2) |
|
|
326 | (1) |
|
18 Advances in Access Control Policies |
|
|
327 | (16) |
|
|
Sabrina De Capitani di Vimercati |
|
|
|
|
|
|
|
|
18.1 Privacy-Preserving Access Control |
|
|
327 | (4) |
|
18.1.1 Credentials Enabling Privacy-Preservation |
|
|
328 | (1) |
|
18.1.2 A Policy Language for Privacy-Preserving Access Control |
|
|
329 | (2) |
|
18.2 Credential Ontologies: Concepts and Relations |
|
|
331 | (2) |
|
|
331 | (1) |
|
18.2.2 Delegation by Recursion |
|
|
332 | (1) |
|
|
333 | (3) |
|
18.3.1 Policy Sanitisation |
|
|
334 | (2) |
|
18.4 Integration into XACML |
|
|
336 | (5) |
|
18.4.1 Credential-Based XACML |
|
|
338 | (2) |
|
18.4.2 SAML as Claims Language |
|
|
340 | (1) |
|
18.4.3 XACML Architecture Extensions |
|
|
340 | (1) |
|
|
341 | (2) |
|
19 Legal Policy Mechanisms |
|
|
343 | (12) |
|
|
|
|
343 | (1) |
|
19.2 Legal Framework for Processing Personal Data |
|
|
344 | (2) |
|
19.3 Gaps in Current Policy Language Approaches |
|
|
346 | (2) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
348 | (2) |
|
19.4.1 Looking into Privacy Policies |
|
|
348 | (1) |
|
19.4.2 Looking at the Law |
|
|
349 | (1) |
|
|
350 | (3) |
|
|
350 | (2) |
|
|
352 | (1) |
|
19.6 Results and Further Research |
|
|
353 | (2) |
|
20 Policy Implementation in XACML |
|
|
355 | (28) |
|
|
|
|
355 | (1) |
|
|
356 | (4) |
|
20.2.1 High Level Architecture |
|
|
356 | (1) |
|
20.2.2 Detailed Architecture |
|
|
357 | (3) |
|
20.3 PPL Policy Language Structure |
|
|
360 | (5) |
|
20.3.1 PolicySets, Policy and Rules |
|
|
361 | (1) |
|
20.3.2 Credential Requirements |
|
|
361 | (1) |
|
20.3.3 Provisional Actions |
|
|
362 | (1) |
|
20.3.4 Data Handling Policies |
|
|
362 | (1) |
|
20.3.5 Data Handling Preferences |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
20.4 PPL Engine Data Model |
|
|
365 | (9) |
|
|
366 | (1) |
|
20.4.2 Package policy.Impl |
|
|
367 | (2) |
|
20.4.3 Package Credential |
|
|
369 | (2) |
|
20.4.4 Package Obligations |
|
|
371 | (1) |
|
20.4.5 Package StickyPolicy |
|
|
372 | (2) |
|
|
374 | (9) |
|
|
375 | (8) |
|
Part V Infrastructures for Privacy and Identity Management |
|
|
|
21 Privacy for Service Oriented Architectures |
|
|
383 | (30) |
|
|
|
|
|
|
|
383 | (2) |
|
21.2 Requirements for Privacy in SOA |
|
|
385 | (7) |
|
21.2.1 Core Policy Requirements |
|
|
386 | (1) |
|
21.2.2 Privacy Logging Requirements |
|
|
387 | (2) |
|
21.2.3 Requirements for Access to Personal Information |
|
|
389 | (1) |
|
21.2.4 Cross-Domain-Specific Requirements |
|
|
389 | (1) |
|
21.2.5 Requirements for Additional Mechanisms |
|
|
390 | (2) |
|
21.3 Abstract Framework Addressing the Lifecycle of Privacy Policies in SOAs |
|
|
392 | (12) |
|
21.3.1 Privacy Issues Arising from SOA |
|
|
394 | (1) |
|
|
395 | (3) |
|
|
398 | (2) |
|
|
400 | (2) |
|
21.3.5 Matching Abstract Framework with SOA Requirements |
|
|
402 | (2) |
|
|
404 | (7) |
|
21.4.1 Policy Composition Scenario |
|
|
405 | (1) |
|
21.4.2 Privacy Policy Composition Challenges |
|
|
406 | (2) |
|
21.4.3 Data-Centric Architecture for Privacy Enforcement |
|
|
408 | (2) |
|
|
410 | (1) |
|
21.5 Outlook and Open Issues |
|
|
411 | (2) |
|
22 Privacy and Identity Management on Mobile Devices: Emerging Technologies and Future Directions for Innovation |
|
|
413 | (18) |
|
|
|
22.1 The Status: Privacy and Identity Management on Smart Mobile Devices |
|
|
413 | (1) |
|
22.2 The Changing Context (I): Multiple Partial Identities across Devices |
|
|
414 | (1) |
|
22.3 The Changing Context (II): Multiple Identity Providing Stakeholders Along an Increasingly Dynamic Mobile Services Value Chain |
|
|
415 | (2) |
|
22.4 Technologies for Identity Management and Privacy Enhancement: Secure Elements |
|
|
417 | (3) |
|
22.5 Present Secure Element Technologies: UICCs and Stickers |
|
|
420 | (2) |
|
22.5.1 The Universal Integrated Circuit Card (UICC) and the Smart Card Web Server |
|
|
420 | (1) |
|
22.5.2 The Sticker as Example for Static Mobile Service Identities |
|
|
421 | (1) |
|
22.6 Emerging Secure Element Technologies: Trusted Execution Environments and the Privacy Challenge |
|
|
422 | (2) |
|
22.7 Technologies for Secure and Dynamic Mobile Services and the Privacy Challenge in Highly Dynamic Environments |
|
|
424 | (2) |
|
22.8 Contributions of the PrimeLife Project for the Advancement of Technologies in the Field |
|
|
426 | (2) |
|
22.9 The Privacy Challenge in Mobile Services and Future Directions for Innovation |
|
|
428 | (3) |
|
23 Privacy by Sustainable Identity Management Enablers |
|
|
431 | (28) |
|
|
|
|
|
|
431 | (1) |
|
23.2 Economic Valuation Approach for Telco-Based Identity Management Enablers |
|
|
432 | (13) |
|
23.2.1 Description of the Baseline Option and Feasible Delta Options |
|
|
434 | (2) |
|
23.2.2 Identification of each Stakeholder's Costs and Benefits Based on Delta Scenarios in Comparison to the Baseline Scenario |
|
|
436 | (3) |
|
23.2.3 Selection of Key Costs and Benefits for each Stakeholder |
|
|
439 | (1) |
|
23.2.4 Mapping of each Stakeholder's Key Cost and Benefits on IdM Service Provider by Cause-Effect Chains |
|
|
439 | (1) |
|
23.2.5 Clustering of Mapped IdM Service Provider Costs and Benefits |
|
|
440 | (3) |
|
23.2.6 Assessment and Aggregation of Clustered IdM Service Provider costs and Benefits |
|
|
443 | (2) |
|
23.2.7 Visualisation of Aggregated IdM Service Provider Costs and Benefits |
|
|
445 | (1) |
|
23.3 Description of the Identity Management Scenarios |
|
|
445 | (6) |
|
|
446 | (1) |
|
23.3.2 Privacy Policy Enforcement |
|
|
447 | (4) |
|
|
451 | (1) |
|
23.5 Summary and Future Work |
|
|
452 | (7) |
|
|
453 | (6) |
|
|
|
24 Open Source Contributions |
|
|
459 | (20) |
|
|
|
|
|
|
|
|
|
|
|
459 | (1) |
|
|
460 | (4) |
|
24.2.1 Clique -- Privacy-Enhanced Social Network Platform |
|
|
460 | (1) |
|
24.2.2 Scramble! -- Audience Segregation by Encryption |
|
|
461 | (1) |
|
24.2.3 Privacy-Awareness Support for Forum Users: Personal Data MOD |
|
|
462 | (2) |
|
24.2.4 Privacy-Enhancing Selective Access Control for Forums |
|
|
464 | (1) |
|
24.3 Dudle -- Privacy-enhanced Web 2.0 Event Scheduling |
|
|
464 | (2) |
|
24.4 The Privacy Dashboard |
|
|
466 | (4) |
|
24.5 Privacy in Databases |
|
|
470 | (2) |
|
24.5.1 Pri-Views -- Protecting Sensitive Values by Fragmentation |
|
|
470 | (1) |
|
|
471 | (1) |
|
24.6 Anonymous Credentials |
|
|
472 | (2) |
|
24.6.1 Identity Mixer Crypto Library |
|
|
472 | (1) |
|
24.6.2 Components for a Privacy-Preserving Access Control System |
|
|
473 | (1) |
|
|
474 | (5) |
|
25 Contributions to Standardisation |
|
|
479 | (14) |
|
|
|
|
|
|
479 | (1) |
|
25.2 Standardisation in ISO/DEC JTC 1/SC 27/WG 5 |
|
|
480 | (5) |
|
25.2.1 ISO 24760 -- Framework for Identity Management |
|
|
481 | (1) |
|
25.2.2 Introducing Privacy Protection Goals to ISO 29101 Privacy Reference Architecture |
|
|
482 | (3) |
|
|
485 | (6) |
|
25.3.1 Workshop on Access Control Application Scenarios |
|
|
486 | (2) |
|
25.3.2 Workshop on Privacy for Advanced Web APIs |
|
|
488 | (1) |
|
25.3.3 Workshop on Privacy and Data Usage Control |
|
|
489 | (1) |
|
25.3.4 Workshop on Internet Privacy |
|
|
490 | (1) |
|
25.4 PrimeLife's Contributions to Standardisation in IETF |
|
|
491 | (1) |
|
25.5 Conclusion and Outlook |
|
|
491 | (2) |
|
26 Best Practice Solutions |
|
|
493 | (12) |
|
|
|
493 | (1) |
|
26.2 Recommendations to Industry |
|
|
493 | (4) |
|
26.2.1 Data Minimisation by Pseudonyms and Private Credentials |
|
|
494 | (1) |
|
26.2.2 Improvement of Privacy Functionality in Social Media |
|
|
494 | (2) |
|
26.2.3 Belter Protection of the User's Privacy on the Web |
|
|
496 | (1) |
|
26.2.4 Better Information of Users on Privacy-Relevant Issues on the Web |
|
|
496 | (1) |
|
26.3 Recommendations to Policy Makers |
|
|
497 | (8) |
|
26.3.1 Clear Guidelines for System Developers and Data Controllers |
|
|
498 | (1) |
|
26.3.2 Incentives and Sanctions |
|
|
499 | (1) |
|
26.3.3 Development of Law |
|
|
499 | (4) |
|
|
503 | (2) |
|
|
505 | (2) |
|
|
Index |
|
507 | |