Scenario, Analysis, and Design of Privacy Throughout Life Demonstrator

The main contribution of this deliverable to the research field of Privacy-Enhancing Identity Management Throughout Life consists in a comprehensive analysis of requirements. Those requirements comprise high-level requirements regarding issues of transparency, data minimisation, controlled data processing, user-controlled identity management, delegation, practicability, and change management. Further, more specific requirements from the socio-cultural and delegation points of view as well as from the actual nature of the envisaged demonstrator (which is backup and synchonisation) are being elaborated. Apart from the elaboration of requirements, solutions based on specific tools and mechanisms are described and discussed. This includes a list of recommendations for policy makers specially addressing lifetime aspects of privacy and identity management. In addition, this documents provides a extensive glossary of terms and concepts important to the given research field.

[1]  Viktor Mayer-Schoenberger,et al.  Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing , 2007 .

[2]  Hannes Federrath,et al.  Modeling the Security of Steganographic Systems , 1998, Information Hiding.

[3]  C. Kuner European Data Protection Law: Corporate Compliance and Regulation , 2007 .

[4]  Marit Hansen,et al.  Identity management throughout one's whole life , 2008, Inf. Secur. Tech. Rep..

[5]  David J. Phillips Privacy policy and PETs , 2001, New Media Soc..

[6]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Bart Preneel,et al.  Cross-Context Delegation through Identity Federation , 2008, BIOSIG.

[9]  Marit Hansen,et al.  PRIME white paper v3, May 2008 , 2008 .

[10]  Ann Cavoukian,et al.  Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.

[11]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  David A. Wagner,et al.  Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.

[14]  Bruno Crispo,et al.  Delegation of Responsibilities , 1998 .

[15]  Dean Povey Optimistic security: a new access control paradigm , 1999, NSPW '99.

[16]  Sebastian Clauß,et al.  Identity management and its support of multilateral security , 2001, Comput. Networks.

[17]  Bruce Schneier,et al.  Secure audit logs to support computer forensics , 1999, TSEC.

[18]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.

[19]  Andreas Pfitzmann,et al.  Lifelong Privacy: Privacy and Identity Management for Life , 2009, PrimeLife.

[20]  Paul Baran,et al.  Communications, computers and people , 1965, AFIPS '65 (Fall, part II).

[21]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[22]  Jan Zibuschka,et al.  Requirements for privacy enhancing tools , 2008 .

[23]  Hans Hedbom,et al.  Analysis of Privacy and Identity Management throughout Life , 2009 .

[24]  Teresa Scassa,et al.  National Identity, Ethnic Surnames and the State , 1996, Canadian journal of law and society.

[25]  Ronald E. Leenes,et al.  Audience Segregation in Social Network Sites , 2010, 2010 IEEE Second International Conference on Social Computing.

[26]  Egbert Dommering Regulating Technology: Code is Not Law , 2006 .

[27]  Katrin Borcea-Pfitzmann,et al.  Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World , 2010, PrimeLife.

[28]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[29]  R. Accorsi,et al.  On Privacy Evidence for UbiComp Environments , 2007 .

[30]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[31]  Abhi Shelat,et al.  Privacy and identity management for everyone , 2005, DIM '05.

[32]  J. Rachels Why privacy is important , 1985 .

[33]  Gregory Neven Final requirements and state-of-the-art for next generation policies , 2009 .

[34]  David Chaum,et al.  Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..

[35]  Johannes A. Buchmann,et al.  Perspectives for cryptographic long-term security , 2006, CACM.

[36]  Sandra Steinbrecher,et al.  PrimeLife Heartbeat H 1.3.4 Definition of: Prototype ideas for selected scenarios , 2009 .

[37]  Martin Meints The Relationship between Data Protection Legislation and Information Security Related Standards , 2008, FIDIS.

[38]  Dowe Korff Are users of social networking sites subject to data protection law, as controllers? , 2009 .

[39]  Ed Dawson,et al.  On a Taxonomy of Delegation , 2009, SEC.

[40]  Sandra Steinbrecher,et al.  PrimeLife Heartbeat H1.3.5: Requirements and concepts for identity management throughout life , 2009 .

[41]  Mihir Bellare,et al.  Forward Integrity For Secure Audit Logs , 1997 .

[42]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[43]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[44]  Marit Hansen,et al.  Delegation for Privacy Management from Womb to Tomb - A European Perspective , 2009, PrimeLife.

[45]  James Q. Whitman The Two Western Cultures of Privacy: Dignity versus Liberty , 2004 .