Atnaujinkite slapukų nuostatas

Privacy and Identity Management for Life 2011 ed. [Kietas viršelis]

Edited by , Edited by , Edited by
  • Formatas: Hardback, 512 pages, aukštis x plotis: 235x155 mm, weight: 963 g, XXIV, 512 p., 1 Hardback
  • Išleidimo metai: 07-Jul-2011
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642203167
  • ISBN-13: 9783642203169
  • Formatas: Hardback, 512 pages, aukštis x plotis: 235x155 mm, weight: 963 g, XXIV, 512 p., 1 Hardback
  • Išleidimo metai: 07-Jul-2011
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642203167
  • ISBN-13: 9783642203169
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.

This book presents new results by leading international researchers on privacy and identity management for life, and offers guidelines for privacy-enhancing tehnology design, for the benefit of system developers in many disciplines.
Introduction
1 PrimeLife
5(28)
Andreas Pfitzmann
Katrin Borcea-Pfitzmann
Jan Camenisch
1.1 Motivation
5(2)
1.2 Vision and Objectives of the PrimeLife Project
7(1)
1.3 Defining Privacy
8(1)
1.4 From Identity via Identity Management to Privacy by Identity Management
9(10)
1.4.1 Identity -- What it is
10(3)
1.4.2 Presentation of Identities -- Pseudonyms
13(4)
1.4.3 Time Aspects of Identity Management and Privacy
17(2)
1.5 Further Facets of Privacy
19(1)
1.6 PrimeLife's Contributions to Protect Privacy
20(13)
1.6.1 Part I - Privacy in Life
22(1)
1.6.2 Part II - Mechanisms for Privacy
22(1)
1.6.3 Part III - Human Computer Interaction (HCI)
23(1)
1.6.4 Part IV - Policy Languages
24(1)
1.6.5 Part V- Infrastructures for Privacy and Identity Management
25(1)
1.6.6 Part VI-Privacy Live
25(2)
References Introduction
27(6)
Part I Privacy in Life
2 Privacy in Social Software
33(28)
Bibi van den Berg
Stefanie Potzsch
Ronald Leenes
Katrin Borcea-Pfitzmann
Filipe Beato
2.1 Scenarios and Requirements
33(4)
2.1.1 Scenario 1: A Social Network Site
35(1)
2.1.2 Scenario 2: A Forum
36(1)
2.1.3 General Requirements
36(1)
2.2 Two Prototypes for Privacy-Enhanced Social Networking
37(13)
2.2.1 Introduction
37(1)
2.2.2 Privacy Issues in Social Network Sites
38(4)
2.2.3 Clique: An Overview
42(4)
2.2.4 Scramble!: An Overview
46(4)
2.3 Privacy-Enhancing Selective Access Control for Forums
50(9)
2.3.1 Objectives
50(1)
2.3.2 Introducing phpBB Forum Software and PRIME Framework
51(1)
2.3.3 Extending phpBB with Selective Access Control
52(2)
2.3.4 Scenario Revisited
54(1)
2.3.5 Privacy-Awareness Information
55(1)
2.3.6 User Survey
55(4)
2.4 Concluding Remarks
59(1)
2.5 Acknowledgements
60(1)
3 Trustworthiness of Online Content
61(26)
Jan Camenisch
Sandra Steinbrecher
Ronald Leenes
Stefanie Potzsch
Benjamin Kellermann
Laura Klaming
3.1 Introduction
61(2)
3.2 Scenarios and requirements
63(7)
3.2.1 Scenarios
63(2)
3.2.2 High-level mechanisms
65(1)
3.2.3 Requirements of mechanisms
66(4)
3.3 Experiments
70(6)
3.3.1 Binding metadata to data
71(3)
3.3.2 User Reputation and Certification
74(2)
3.4 Demonstrators
76(8)
3.4.1 Trustworthy Blogging
76(2)
3.4.2 Encouraging Comments with Incentives
78(2)
3.4.3 Author reputation system and trust evaluation of content in MediaWiki
80(4)
3.5 Conclusive Remarks
84(1)
3.6 Acknowledgements
85(2)
4 Identity and Privacy Issues Throughout Life
87(30)
Jaromir Dobias
Marit Hansen
Stefan Kopsell
Maren Raguse
Arnold Roosendaal
Andreas Pfitzmann
Sandra Steinbrecher
Katalin Storf
Harald Zwingelberg
4.1 Challenges and Requirements
87(12)
4.1.1 Dealing with Dynamics
87(4)
4.1.2 Digital Footprint
91(3)
4.1.3 Concepts for Delegation
94(5)
4.2 Demonstrator
99(11)
4.2.1 Overview of the Backup Demonstrator Architecture
102(7)
4.2.2 Deployment and Usage of the Demonstrator
109(1)
4.3 Concluding Remarks
110(1)
4.4 Acknowledgements
110(7)
References Part I
111(6)
Part II Mechanisms for Privacy
5 Cryptographic Mechanisms for Privacy
117(18)
Jan Camenisch
Maria Dubovitskaya
Markulf Kohlweiss
Jorn Lapon
Gregory Neven
5.1 Introduction
117(1)
5.2 Cryptography to the Aid
118(1)
5.3 Private Credentials, Their Extensions, and Applications
119(4)
5.3.1 Extended Functionalities
120(3)
5.3.2 Direct Anonymous Attestation
123(1)
5.4 Other Privacy-Enhancing Authentication Mechanisms
123(4)
5.4.1 Privacy-Enhancing Encryption
126(1)
5.5 Electronic Voting, Polling, and Petitions
127(1)
5.6 Oblivious Transfer with Access Control and Prices
128(2)
5.7 Oblivious Trusted Third Parties
130(4)
5.8 Conclusion
134(1)
6 Transparency Tools
135(10)
Hans Hedbom
Tobias Pulls
Marit Hansen
6.1 Introduction]
135(2)
6.2 Setting the Scene
137(1)
6.3 On Privacy Preserving and Secure Logs
138(1)
6.3.1 Attacker Model and Security Evaluation
139(1)
6.4 Prior Work and Our Contribution
139(1)
6.5 Technical Overview
140(3)
6.5.1 State and Secrets
140(1)
6.5.2 Entry Structure and Storage
141(1)
6.5.3 API
142(1)
6.5.4 Unlinkability
142(1)
6.6 Conclusion and Outlook
143(2)
7 Interoperability of Trust and Reputation Tools
145(12)
Sandra Steinbrecher
Stefan Schiffner
7.1 Introduction
145(1)
7.2 Social need
146(1)
7.3 Legal Aspect
147(1)
7.4 Security and Privacy Requirements
148(1)
7.5 Technical Implementability
149(1)
7.6 Infrastructure
150(5)
7.6.1 Interoperability with Applications
150(2)
7.6.2 Interoperability with Trust Management
152(1)
7.6.3 Interoperability with Identity Management
153(1)
7.6.4 Resulting implementation
154(1)
7.7 Conclusion
155(2)
8 Data Privacy
157(24)
Michele Bezzi
Sabrina De Capitani di Vimercati
Sara Foresti
Giovanni Livraga
Stefano Paraboschi
Pierangela Samarati
8.1 Introduction
157(1)
8.2 Privacy Metrics and Information Theory
158(7)
8.2.1 Basic Concepts
159(1)
8.2.2 Traditional Privacy Metrics
160(1)
8.2.3 An Information Theoretic Approach for Privacy Metrics
161(3)
8.2.4 Protecting Privacy of Sensitive Value Distributions
164(1)
8.3 Privacy Protection Techniques
165(2)
8.3.1 Basic Concepts
165(2)
8.4 Fragmentation and Encryption
167(4)
8.4.1 Fragmentation Model
168(1)
8.4.2 Minimal Fragmentation
169(1)
8.4.3 Query Evaluation
170(1)
8.5 Departing from Encryption
171(4)
8.5.1 Fragmentation Model
172(1)
8.5.2 Minimal Fragmentation
172(2)
8.5.3 Query Evaluation
174(1)
8.6 Preserving Utility in Data Publication
175(4)
8.6.1 Visibility Requirements
175(1)
8.6.2 Loose Associations
176(3)
8.7 Conclusions
179(2)
9 Selective Exchange of Confidential Data in the Outsourcing Scenario
181(32)
Sabrina De Capitani di Vimercati
Sara Foresti
Stefano Paraboschi
Gerardo Pelosi
Pierangela Samarati
9.1 Introduction
181(2)
9.2 Preliminaries
183(1)
9.3 Encryption Schema
184(5)
9.3.1 Key Agreement
184(1)
9.3.2 Key Derivation
185(2)
9.3.3 Encryption Policy
187(2)
9.4 Resource Sharing Management
189(2)
9.5 Comparison with the PGP's Key-Management Su'ategy
191(1)
9.6 Exposure Evaluation
192(2)
9.6.1 Anonymous Accesses
192(2)
9.7 Encryption Policy Updates
194(4)
9.7.1 Two-Layered Encryption Model
195(1)
9.7.2 Over-Encryption
196(1)
9.7.3 Collusion Evaluation
196(2)
9.8 Conclusions
198(15)
References Part II
199(14)
Part III Human Computer Interaction (HCI)
10 Pet-Uses
213(8)
Erik Wastlund
Peter Wolkerstorfer
10.1 Introduction
213(2)
10.2 PET-USES in Practice
215(2)
10.2.1 When to use the PET-USES
216(1)
10.2.2 How to use the PET-USES
216(1)
10.3 Conclusions
217(1)
10.4 Appendix: PET-USES [ 1.0]
217(4)
10.4.1 Instructions
217(4)
11 HCI for PrimeLife Prototypes
221(12)
Cornelia Graf
Peter Wolkerstorfer
Christina Hochleitner
Erik Wastlund
Manfred Tscheligi
11.1 Introduction
221(1)
11.2 Overview of HCI challenges
222(3)
11.2.1 Challenge 1: Limited User Knowledge of PETs
222(1)
11.2.2 Challenge 2: Technologically Driven Development of PETS
223(1)
11.2.3 Challenge 3: Understanding PET Related Terms
223(1)
11.2.4 Challenge 4: Wrong Mental Models of PETs
223(1)
11.2.5 Challenge 5: Privacy as a Secondary Task
224(1)
11.2.6 Challenge 6: Complex Mechanisms are Hard to Understand
225(1)
11.3 Tackling the Challenges
225(3)
11.3.1 Limited User Knowledge of PETs
225(1)
11.3.2 Technologically Driven Development of PETs
226(1)
11.3.3 Understanding of PET Related Terms
226(1)
11.3.4 Wrong Mental Models of PETs
227(1)
11.3.5 Privacy as a Secondary Task
227(1)
11.3.6 Complex Mechanisms are Hard to Understand
228(1)
11.4 HCI Activities and Software Development
228(3)
11.4.1 Backup Prototype
228(1)
11.4.2 Privacy Dashboard
229(1)
11.4.3 Examples Reflected
230(1)
11.5 Discussion and Outlook
231(2)
12 The Users' Mental Models' Effect on their Comprehension of Anonymous Credentials
233(12)
Erik Wastlund
Simone Fischer-Hubner
12.1 Introduction
233(3)
12.1.1 Anonymous Credentials
234(1)
12.1.2 Related Work
235(1)
12.2 Performed User Tests
236(6)
12.2.1 Method
236(2)
12.2.2 The Card-Based Approach
238(2)
12.2.3 The Attribute-Based Approach
240(2)
12.2.4 Results of the User Studies
242(1)
12.3 Conclusions & Future Work
242(1)
12.4 Acknowledgments
243(2)
13 Trust and Assurance HCI
245(16)
Simone Fischer-Hubner
Hans Hedbom
Erik Wastlund
13.1 Introduction
245(1)
13.2 Social Trust Factors
246(1)
13.3 A Trust Evaluation Function
247(6)
13.3.1 Trust Parameters Used
247(2)
13.3.2 Design Principles and Test Results
249(2)
13.3.3 Test Results
251(2)
13.4 The Data Track
253(7)
13.4.1 Use of the Data Track
254(2)
13.4.2 Test Scenarios & Test Setups
256(1)
13.4.3 Results of the Usability Tests
257(2)
13.4.4 Discussion of Data Track Usability Tests
259(1)
13.5 Conclusions
260(1)
14 HCI for Policy Display and Administration
261(18)
Julio Angulo
Simone Fischer-Hubner
Tobias Pulls
Ulrich Konig
14.1 Introduction
261(2)
14.2 Related Work
263(2)
14.3 User Interfaces for Policy Management and Display
265(10)
14.3.1 Selecting Privacy Preferences
266(1)
14.3.2 The "Send Data?" Dialog
267(6)
14.3.3 Testing the Usability of the "Send Data?" Dialog
273(2)
14.4 Conclusions and Outlook
275(4)
15 Privacy Policy Icons
279(16)
Leif-Erik Holtz
Harald Zwingelberg
Marit Hansen
15.1 Introduction
279(1)
15.2 Motivation for Introducing Privacy Icons
280(1)
15.3 Related Work
280(1)
15.4 PrimeLife Icon Sets
281(1)
15.4.1 PrimeLife Icon Set for General Usage
281(1)
15.4.2 PrimeLife Icon Set for Social Networks
282(1)
15.5 Test Results
282(2)
15.6 An Approach for Handling E-mail Data: Privicons
284(1)
15.7 Conclusions and Outlook
285(10)
References Part III
287(8)
Part IV Policy Languages
16 Policy Requirements and State of the Art
295(18)
Carine Bournez
Claudio A. Ardagna
16.1 Definitions
295(2)
16.1.1 Data Handling Policies
295(1)
16.1.2 Access Control Policies
296(1)
16.1.3 Trust Policies
296(1)
16.2 Legal Requirements
297(2)
16.3 Policy Language Requirements
299(9)
16.3.1 General Design Principles and Expressivity
299(1)
16.3.2 Requirements for Data Handling Policies
300(3)
16.3.3 Requirements for Access Control policies
303(2)
16.3.4 Requirements for Trust policies
305(2)
16.3.5 Other Technical Requirements for PrimeLife
307(1)
16.4 State of the Art
308(5)
16.4.1 Access Control Policy Languages
308(1)
16.4.2 Data Handling Policy Languages
309(1)
16.4.3 Anonymous Credential Systems and Private Information Management
310(3)
17 Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage
313(14)
Laurent Bussard
Gregory Neven
Franz-Stefan Preiss
17.1 Privacy Specifications: Preferences, Policies, and Sticky Policies
313(2)
17.2 Matching Data Handling
315(2)
17.2.1 BooleanMatch
315(1)
17.2.2 Going Further than Boolean Match
316(1)
17.3 Obligations
317(4)
17.3.1 Triggers
318(1)
17.3.2 Actions
319(1)
17.3.3 Enforcement
320(1)
17.4 Authorisations
321(1)
17.5 Downstream Data Handling
321(5)
17.5.1 Structure of Downstream Authorisations
322(1)
17.5.2 Proactive Matching of Downstream Data Handling
323(1)
17.5.3 Lazy Matching of Downstream Data Handling
324(2)
17.6 Conclusion
326(1)
18 Advances in Access Control Policies
327(16)
Claudio A. Ardagna
Sabrina De Capitani di Vimercati
Gregory Neven
Stefano Paraboschi
Eros Pedrini
Franz-Stefan Preiss
Pierangela Samarati
Mario Verdicchio
18.1 Privacy-Preserving Access Control
327(4)
18.1.1 Credentials Enabling Privacy-Preservation
328(1)
18.1.2 A Policy Language for Privacy-Preserving Access Control
329(2)
18.2 Credential Ontologies: Concepts and Relations
331(2)
18.2.1 Abstractions
331(1)
18.2.2 Delegation by Recursion
332(1)
18.3 Dialog Management
333(3)
18.3.1 Policy Sanitisation
334(2)
18.4 Integration into XACML
336(5)
18.4.1 Credential-Based XACML
338(2)
18.4.2 SAML as Claims Language
340(1)
18.4.3 XACML Architecture Extensions
340(1)
18.5 Concluding Remarks
341(2)
19 Legal Policy Mechanisms
343(12)
Leif-Erik Holtz
Jan Schallabock
19.1 Introduction
343(1)
19.2 Legal Framework for Processing Personal Data
344(2)
19.3 Gaps in Current Policy Language Approaches
346(2)
19.3.1 XACML
346(1)
19.3.2 P3P
347(1)
19.4 Methodology
348(2)
19.4.1 Looking into Privacy Policies
348(1)
19.4.2 Looking at the Law
349(1)
19.5 Use Cases
350(3)
19.5.1 Online Shopping
350(2)
19.5.2 Social Networking
352(1)
19.6 Results and Further Research
353(2)
20 Policy Implementation in XACML
355(28)
Slim Trabelsi
Akram Njeh
20.1 Introduction
355(1)
20.2 Architecture
356(4)
20.2.1 High Level Architecture
356(1)
20.2.2 Detailed Architecture
357(3)
20.3 PPL Policy Language Structure
360(5)
20.3.1 PolicySets, Policy and Rules
361(1)
20.3.2 Credential Requirements
361(1)
20.3.3 Provisional Actions
362(1)
20.3.4 Data Handling Policies
362(1)
20.3.5 Data Handling Preferences
363(1)
20.3.6 Sticky Policies
363(1)
20.3.7 Obligations
364(1)
20.3.8 Authorisations
365(1)
20.4 PPL Engine Data Model
365(9)
20.4.1 Package pii
366(1)
20.4.2 Package policy.Impl
367(2)
20.4.3 Package Credential
369(2)
20.4.4 Package Obligations
371(1)
20.4.5 Package StickyPolicy
372(2)
20.5 Conclusion
374(9)
References Part IV
375(8)
Part V Infrastructures for Privacy and Identity Management
21 Privacy for Service Oriented Architectures
383(30)
Ulrich Pinsdorf
Laurent Bussard
Sebastian Meissner
Jan Schallabock
Stuart Short
21.1 Introduction
383(2)
21.2 Requirements for Privacy in SOA
385(7)
21.2.1 Core Policy Requirements
386(1)
21.2.2 Privacy Logging Requirements
387(2)
21.2.3 Requirements for Access to Personal Information
389(1)
21.2.4 Cross-Domain-Specific Requirements
389(1)
21.2.5 Requirements for Additional Mechanisms
390(2)
21.3 Abstract Framework Addressing the Lifecycle of Privacy Policies in SOAs
392(12)
21.3.1 Privacy Issues Arising from SOA
394(1)
21.3.2 Abstract Protocol
395(3)
21.3.3 PII Provider
398(2)
21.3.4 PII Consumer
400(2)
21.3.5 Matching Abstract Framework with SOA Requirements
402(2)
21.4 Policy Composition
404(7)
21.4.1 Policy Composition Scenario
405(1)
21.4.2 Privacy Policy Composition Challenges
406(2)
21.4.3 Data-Centric Architecture for Privacy Enforcement
408(2)
21.4.4 Conclusion
410(1)
21.5 Outlook and Open Issues
411(2)
22 Privacy and Identity Management on Mobile Devices: Emerging Technologies and Future Directions for Innovation
413(18)
Marc-Michael Bergfeld
Stephan Spitz
22.1 The Status: Privacy and Identity Management on Smart Mobile Devices
413(1)
22.2 The Changing Context (I): Multiple Partial Identities across Devices
414(1)
22.3 The Changing Context (II): Multiple Identity Providing Stakeholders Along an Increasingly Dynamic Mobile Services Value Chain
415(2)
22.4 Technologies for Identity Management and Privacy Enhancement: Secure Elements
417(3)
22.5 Present Secure Element Technologies: UICCs and Stickers
420(2)
22.5.1 The Universal Integrated Circuit Card (UICC) and the Smart Card Web Server
420(1)
22.5.2 The Sticker as Example for Static Mobile Service Identities
421(1)
22.6 Emerging Secure Element Technologies: Trusted Execution Environments and the Privacy Challenge
422(2)
22.7 Technologies for Secure and Dynamic Mobile Services and the Privacy Challenge in Highly Dynamic Environments
424(2)
22.8 Contributions of the PrimeLife Project for the Advancement of Technologies in the Field
426(2)
22.9 The Privacy Challenge in Mobile Services and Future Directions for Innovation
428(3)
23 Privacy by Sustainable Identity Management Enablers
431(28)
Sascha Koschinat
Gokhan Bal
Christian Weber
Kai Rannenberg
23.1 Introduction
431(1)
23.2 Economic Valuation Approach for Telco-Based Identity Management Enablers
432(13)
23.2.1 Description of the Baseline Option and Feasible Delta Options
434(2)
23.2.2 Identification of each Stakeholder's Costs and Benefits Based on Delta Scenarios in Comparison to the Baseline Scenario
436(3)
23.2.3 Selection of Key Costs and Benefits for each Stakeholder
439(1)
23.2.4 Mapping of each Stakeholder's Key Cost and Benefits on IdM Service Provider by Cause-Effect Chains
439(1)
23.2.5 Clustering of Mapped IdM Service Provider Costs and Benefits
440(3)
23.2.6 Assessment and Aggregation of Clustered IdM Service Provider costs and Benefits
443(2)
23.2.7 Visualisation of Aggregated IdM Service Provider Costs and Benefits
445(1)
23.3 Description of the Identity Management Scenarios
445(6)
23.3.1 Authentication
446(1)
23.3.2 Privacy Policy Enforcement
447(4)
23.4 Related Work
451(1)
23.5 Summary and Future Work
452(7)
References Part V
453(6)
Part VI Privacy Live
24 Open Source Contributions
459(20)
Jan Camenisch
Benjamin Kellermann
Stefan Kopsell
Stefano Paraboschi
Franz-Stefan Preiss
Stefanie Potzsch
Dave Raggett
Pierangela Samarati
Karel Wouters
24.1 Introduction
459(1)
24.2 Social Software
460(4)
24.2.1 Clique -- Privacy-Enhanced Social Network Platform
460(1)
24.2.2 Scramble! -- Audience Segregation by Encryption
461(1)
24.2.3 Privacy-Awareness Support for Forum Users: Personal Data MOD
462(2)
24.2.4 Privacy-Enhancing Selective Access Control for Forums
464(1)
24.3 Dudle -- Privacy-enhanced Web 2.0 Event Scheduling
464(2)
24.4 The Privacy Dashboard
466(4)
24.5 Privacy in Databases
470(2)
24.5.1 Pri-Views -- Protecting Sensitive Values by Fragmentation
470(1)
24.5.2 Over-Encrypt
471(1)
24.6 Anonymous Credentials
472(2)
24.6.1 Identity Mixer Crypto Library
472(1)
24.6.2 Components for a Privacy-Preserving Access Control System
473(1)
24.7 Conclusion
474(5)
25 Contributions to Standardisation
479(14)
Hans Hedbom
Jan Schallabock
Rigo Wenning
Marit Hansen
25.1 Introduction
479(1)
25.2 Standardisation in ISO/DEC JTC 1/SC 27/WG 5
480(5)
25.2.1 ISO 24760 -- Framework for Identity Management
481(1)
25.2.2 Introducing Privacy Protection Goals to ISO 29101 Privacy Reference Architecture
482(3)
25.3 Web Privacy
485(6)
25.3.1 Workshop on Access Control Application Scenarios
486(2)
25.3.2 Workshop on Privacy for Advanced Web APIs
488(1)
25.3.3 Workshop on Privacy and Data Usage Control
489(1)
25.3.4 Workshop on Internet Privacy
490(1)
25.4 PrimeLife's Contributions to Standardisation in IETF
491(1)
25.5 Conclusion and Outlook
491(2)
26 Best Practice Solutions
493(12)
Marit Hansen
26.1 Introduction
493(1)
26.2 Recommendations to Industry
493(4)
26.2.1 Data Minimisation by Pseudonyms and Private Credentials
494(1)
26.2.2 Improvement of Privacy Functionality in Social Media
494(2)
26.2.3 Belter Protection of the User's Privacy on the Web
496(1)
26.2.4 Better Information of Users on Privacy-Relevant Issues on the Web
496(1)
26.3 Recommendations to Policy Makers
497(8)
26.3.1 Clear Guidelines for System Developers and Data Controllers
498(1)
26.3.2 Incentives and Sanctions
499(1)
26.3.3 Development of Law
499(4)
References Part VI
503(2)
27 PrimeLife's Legacy
505(2)
Jan Camenisch
Marit Hansen
Index 507