TU Darmstadt / ULB / TUbiblio

Constrained PET Composition for Measuring Enforced Privacy

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg :
Constrained PET Composition for Measuring Enforced Privacy.
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES) ACM
[Conference or Workshop Item] , (2017)

Abstract

Privacy Enhancing Technologies (PETs) are well-defined, domain-specific means to preserve information privacy in computerized systems, i.e., by protecting Personally Identifiable Information (PII). We believe that increasing privacy awareness and governance will lead to wider adoption of PETs in service infrastructures. To support that, a better understanding of privacy-enhanced services composed out of multiple PETs is necessary. To the best of the authors' knowledge, there is no general domain-independent and formal PET model and research about their composition is missing.

The work at hand presents a formal, set-based and domain-independent taxonomy model for PETs, along with an algebra for constrained composition of PETs. The measurement of enforced privacy in service infrastructures with deployed PETs is one of many use cases for such a PET algebra and is demonstrated subsequently in a scenario with two exemplary privacy-enhanced services.

Item Type: Conference or Workshop Item
Erschienen: 2017
Creators: Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg
Title: Constrained PET Composition for Measuring Enforced Privacy
Language: English
Abstract:

Privacy Enhancing Technologies (PETs) are well-defined, domain-specific means to preserve information privacy in computerized systems, i.e., by protecting Personally Identifiable Information (PII). We believe that increasing privacy awareness and governance will lead to wider adoption of PETs in service infrastructures. To support that, a better understanding of privacy-enhanced services composed out of multiple PETs is necessary. To the best of the authors' knowledge, there is no general domain-independent and formal PET model and research about their composition is missing.

The work at hand presents a formal, set-based and domain-independent taxonomy model for PETs, along with an algebra for constrained composition of PETs. The measurement of enforced privacy in service infrastructures with deployed PETs is one of many use cases for such a PET algebra and is demonstrated subsequently in a scenario with two exemplary privacy-enhanced services.

Title of Book: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES)
Publisher: ACM
Uncontrolled Keywords: SPIN: Smart Protection in Infrastructures and Networks
Divisions: Department of Computer Science
Department of Computer Science > Telecooperation
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CRISP - Center for Research in Security and Privacy
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Date Deposited: 23 May 2017 18:31
DOI: 10.1145/3098954.3098968
Identification Number: TUD-CS-2017-0114
Export:

Optionen (nur für Redakteure)

View Item View Item