Skip to main content

2018 | OriginalPaper | Buchkapitel

On Crossroads of Privacy Protection

verfasst von : Mirosław Kutyłowski

Erschienen in: Information Security and Cryptology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The privacy protection has recently become a hot topic because of the increase in cyber-crime (using personal data for mounting attacks) as well as legal obligations for parties controlling personal data (eg. GDPR regulation of European Union). This creates a big market for pragmatic technical solutions.
In this paper we discuss a few general issues related to these problems, focused on current challenges and the necessity of paradigm shifting in the construction of IT systems, which should be secure-by-design in a demonstrable way.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat The European Parliament and the Council of the European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ec (General Data Protection Regulation). Off. J. Eur. Union 119 The European Parliament and the Council of the European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ec (General Data Protection Regulation). Off. J. Eur. Union 119
3.
Zurück zum Zitat Microsoft: U-Prove. Webpage of the project. Accessed 2017 Microsoft: U-Prove. Webpage of the project. Accessed 2017
4.
Zurück zum Zitat IBM: Idemix. Webpage of the project. Accessed 2017 IBM: Idemix. Webpage of the project. Accessed 2017
6.
Zurück zum Zitat Camenisch, J., Lehmann, A.: (Un)linkable pseudonyms for governmental databases, pp. 1467–1479. [17] Camenisch, J., Lehmann, A.: (Un)linkable pseudonyms for governmental databases, pp. 1467–1479. [17]
7.
Zurück zum Zitat Bringer, J., Chabanne, H., Lescuyer, R., Patey, A.: Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 255–272. Springer, Heidelberg (2014) Bringer, J., Chabanne, H., Lescuyer, R., Patey, A.: Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 255–272. Springer, Heidelberg (2014)
8.
Zurück zum Zitat Kluczniak, K.: Anonymous authentication using electronic identity documents. Ph.D. dissertation, Institute of Computer Science, Polish Academy of Sciences (2016) Kluczniak, K.: Anonymous authentication using electronic identity documents. Ph.D. dissertation, Institute of Computer Science, Polish Academy of Sciences (2016)
9.
Zurück zum Zitat Popoveniuc, S., Kelsey, J., Regenscheid, A., Vora, P.L.: Performance requirements for end-to-end verifiable elections. In: Jones, D.W., Quisquater, J., Rescorla, E. (eds.) 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2010, Washington, D.C., USA, 9–10 August 2010. USENIX Association (2010) Popoveniuc, S., Kelsey, J., Regenscheid, A., Vora, P.L.: Performance requirements for end-to-end verifiable elections. In: Jones, D.W., Quisquater, J., Rescorla, E. (eds.) 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2010, Washington, D.C., USA, 9–10 August 2010. USENIX Association (2010)
11.
Zurück zum Zitat Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signature schemes, pp. 364–375. [17] Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signature schemes, pp. 364–375. [17]
12.
Zurück zum Zitat Tang, Q., Yung, M.: Cliptography: post-snowden cryptography. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October–03 November 2017, pp. 2615–2616. ACM (2017) Tang, Q., Yung, M.: Cliptography: post-snowden cryptography. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October–03 November 2017, pp. 2615–2616. ACM (2017)
14.
Zurück zum Zitat Hanzlik, L., Kubiak, P., Kutylowski, M.: Tracing attacks on U-prove with revocation mechanism: tracing attacks for U-prove. In: Bao, F., Miller, S., Zhou, J., Ahn, G. (eds.) Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2015, Singapore, 14–17 April 2015, pp. 603–608. ACM (2015) Hanzlik, L., Kubiak, P., Kutylowski, M.: Tracing attacks on U-prove with revocation mechanism: tracing attacks for U-prove. In: Bao, F., Miller, S., Zhou, J., Ahn, G. (eds.) Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2015, Singapore, 14–17 April 2015, pp. 603–608. ACM (2015)
16.
Zurück zum Zitat ISO/IEC JTC1 SC17 WG3/TF5 for the International Civil Aviation Organization: Supplemental access control for machine readable travel documents. Technical report (2014) version 1.1, April 2014 ISO/IEC JTC1 SC17 WG3/TF5 for the International Civil Aviation Organization: Supplemental access control for machine readable travel documents. Technical report (2014) version 1.1, April 2014
17.
Zurück zum Zitat Ray, I., Li, N., Kruegel, C. (eds.): Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–6 October 2015. ACM (2015) Ray, I., Li, N., Kruegel, C. (eds.): Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–6 October 2015. ACM (2015)
Metadaten
Titel
On Crossroads of Privacy Protection
verfasst von
Mirosław Kutyłowski
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75160-3_2

Premium Partner