SlideShare une entreprise Scribd logo
1  sur  8
Trustworthy Infrastructure for PDM
Digital Enlightenment Forum 2013
Brussels, 18-20 Sept. 2013
Ioannis Krontiris
Goethe University Frankfurt
Privacy-ABCs
• Benefits of Privacy-ABCs
– Privacy-ABCs are by default untraceable (no user-tracking)
– Enable minimal disclosure (user reveals only the necessary information)
– User can chose to stay anonymous or generate (unlimited number of)
pseudonyms
– Advanced security (no sharing of credentials, device-binding for extra
protection)
• ABC4Trust objectives: A common, unified architecture for ABC systems to
enable
– Comparing their respective features
– Combining them on common platforms – reference implementation – 2 pilots
– “Lock-In” free usage of ABC systems
• Raise trust in privacy-ABC technologies
http://abc4trust.eu/
ABC4Trust - About
• Scheduled duration: November 2010 – February2015
• Funding: The ABC4Trust project receives research funding from the European
Union's Seventh Framework Programme under grant agreement n° 257782 as part
of the “ICT Trust and Security Research” theme.
• Web Page: www.abc4trust.eu
ABC4Trust @GitHub
• https://github.com/p2abcen
gine/
• Source codes available
under Apache license
• Documentation, installation
guide and wiki pages
Pilot Applications
• Norrtullskolan School, Söderhamn, Sweden
• School internal social network for communication
among pupils, teachers, and personnel
• Sept 2013 – Dec 2013
• University of Patras, Greece
• Course ratings conducted anonymously without
lecturers knowing participants’ identities
• Conduct polls based on attendance
• Oct 2013 – Jan 2014
Privacy-ABCs and eIDs
• eID cards a gateway to personal information with risks
to the privacy of citizens
– Build privacy-respecting architectures that prevent tracking of
the citizen
• Achieving international interoperability is an important
goal
– Build privacy preserving solutions that can be deployed for
trans-border uses within the EU
Challenges ahead
• Address usability issues
– innovative tools, such as “virtual care-takers,” to empower users make
decisions that they cannot understand or evaluate properly
• Address engineering problems
– integrating privacy technologies on large scale deployments is still ill
understood
– examine methods of evaluation, criteria and metrics
• Address continuously new data collection practices and data
flows
– Data treated by cloud-based applications
– Sensors that collect personal information
Ioannis Krontiris {ikrontiris@gmx.de},
Goethe University Frankfurt, Germany
Thank you!

Contenu connexe

Tendances

Jose Antonio presentation at WSDL
Jose Antonio presentation at WSDLJose Antonio presentation at WSDL
Jose Antonio presentation at WSDLJose Antonio Olvera
 
Cybersecurity 2020
Cybersecurity 2020Cybersecurity 2020
Cybersecurity 2020JuliaGladka
 
Security and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic CommunicationSecurity and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic CommunicationMindaugas Kiskis
 
Blockchain Specialization (The State University of New York & University at B...
Blockchain Specialization (The State University of New York & University at B...Blockchain Specialization (The State University of New York & University at B...
Blockchain Specialization (The State University of New York & University at B...Ahmed Tealeb
 
REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault...
REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault...REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault...
REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault...Agence du Numérique (AdN)
 
Internet Security for Beginners
Internet Security for Beginners Internet Security for Beginners
Internet Security for Beginners chee wai wong
 
UPM GSI Corporate Presentation
UPM GSI Corporate PresentationUPM GSI Corporate Presentation
UPM GSI Corporate PresentationCarlos A. Iglesias
 
Tri ICT project
Tri ICT projectTri ICT project
Tri ICT projectTRI ICT
 
Special Session On Internet Based Services
Special Session On Internet Based ServicesSpecial Session On Internet Based Services
Special Session On Internet Based Servicesjiali zhang
 
Smart education a review and future research directions
Smart education  a review and future research directionsSmart education  a review and future research directions
Smart education a review and future research directionseMadrid network
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 
USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015Andreas Drakos
 
LoCloud Collections: set up your own digital library, museum or archive in th...
LoCloud Collections: set up your own digital library, museum or archive in th...LoCloud Collections: set up your own digital library, museum or archive in th...
LoCloud Collections: set up your own digital library, museum or archive in th...locloud
 
Semantic Web, a general overview
Semantic Web, a general overviewSemantic Web, a general overview
Semantic Web, a general overviewGiacomo Bartoli
 

Tendances (20)

Jose Antonio presentation at WSDL
Jose Antonio presentation at WSDLJose Antonio presentation at WSDL
Jose Antonio presentation at WSDL
 
Cybersecurity 2020
Cybersecurity 2020Cybersecurity 2020
Cybersecurity 2020
 
Security and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic CommunicationSecurity and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic Communication
 
Blockchain Specialization (The State University of New York & University at B...
Blockchain Specialization (The State University of New York & University at B...Blockchain Specialization (The State University of New York & University at B...
Blockchain Specialization (The State University of New York & University at B...
 
Enisa and cyber security standards
Enisa and cyber security standardsEnisa and cyber security standards
Enisa and cyber security standards
 
REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault...
REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault...REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault...
REASSURE Robust and Efficient Approaches to Evaluating Side Channel and Fault...
 
Internet Security for Beginners
Internet Security for Beginners Internet Security for Beginners
Internet Security for Beginners
 
UPM GSI Corporate Presentation
UPM GSI Corporate PresentationUPM GSI Corporate Presentation
UPM GSI Corporate Presentation
 
CV Amine Semma
CV Amine SemmaCV Amine Semma
CV Amine Semma
 
Tri ICT project
Tri ICT projectTri ICT project
Tri ICT project
 
Special Session On Internet Based Services
Special Session On Internet Based ServicesSpecial Session On Internet Based Services
Special Session On Internet Based Services
 
Enisa internet mapping project-20130523
Enisa internet mapping project-20130523Enisa internet mapping project-20130523
Enisa internet mapping project-20130523
 
Smart education a review and future research directions
Smart education  a review and future research directionsSmart education  a review and future research directions
Smart education a review and future research directions
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015
 
9 knowledge café summary
9 knowledge café summary9 knowledge café summary
9 knowledge café summary
 
European Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challengesEuropean Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challenges
 
LoCloud Collections: set up your own digital library, museum or archive in th...
LoCloud Collections: set up your own digital library, museum or archive in th...LoCloud Collections: set up your own digital library, museum or archive in th...
LoCloud Collections: set up your own digital library, museum or archive in th...
 
Semantic Web, a general overview
Semantic Web, a general overviewSemantic Web, a general overview
Semantic Web, a general overview
 

Similaire à Trustworthy Infrastructure for Personal Data Management

Slides Sloan-C 2009 SuGI Seifert
Slides Sloan-C 2009 SuGI SeifertSlides Sloan-C 2009 SuGI Seifert
Slides Sloan-C 2009 SuGI Seifertguest1c848d5a
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Ioannis Krontiris
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_doolyzdooly
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @heregadisagemechu1
 
International Cooperation for Research on Privacy and Data Protection - Austr...
International Cooperation for Research on Privacy and Data Protection - Austr...International Cooperation for Research on Privacy and Data Protection - Austr...
International Cooperation for Research on Privacy and Data Protection - Austr...Liming Zhu
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up NIKOLAOS KOUTRAS
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
Visual Authentication - A Secure Single Step Authentication for User Authoriz...
Visual Authentication - A Secure Single Step Authentication for User Authoriz...Visual Authentication - A Secure Single Step Authentication for User Authoriz...
Visual Authentication - A Secure Single Step Authentication for User Authoriz...EISLab
 
2010 EGITF Amsterdam - Gap between GRID and Humanities
2010 EGITF Amsterdam - Gap between GRID and Humanities2010 EGITF Amsterdam - Gap between GRID and Humanities
2010 EGITF Amsterdam - Gap between GRID and HumanitiesDirk Roorda
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES.eu
 
Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...Yiannis Kompatsiaris
 
Towards a Community-driven Data Science Body of Knowledge – Data Management S...
Towards a Community-driven Data Science Body of Knowledge – Data Management S...Towards a Community-driven Data Science Body of Knowledge – Data Management S...
Towards a Community-driven Data Science Body of Knowledge – Data Management S...Research Data Alliance
 
Emerging Web Technologies October 2013
Emerging Web Technologies October 2013Emerging Web Technologies October 2013
Emerging Web Technologies October 2013bthat
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasFulvio Corno
 
Project COLA - Cloud Orchestration at the Level of Application - Introductio...
Project COLA - Cloud Orchestration at the Level of Application -  Introductio...Project COLA - Cloud Orchestration at the Level of Application -  Introductio...
Project COLA - Cloud Orchestration at the Level of Application - Introductio...Project COLA
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsMustafa Jarrar
 

Similaire à Trustworthy Infrastructure for Personal Data Management (20)

Slides Sloan-C 2009 SuGI Seifert
Slides Sloan-C 2009 SuGI SeifertSlides Sloan-C 2009 SuGI Seifert
Slides Sloan-C 2009 SuGI Seifert
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
 
International Cooperation for Research on Privacy and Data Protection - Austr...
International Cooperation for Research on Privacy and Data Protection - Austr...International Cooperation for Research on Privacy and Data Protection - Austr...
International Cooperation for Research on Privacy and Data Protection - Austr...
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up
 
Brokerage and market Platform
Brokerage and market PlatformBrokerage and market Platform
Brokerage and market Platform
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
Visual Authentication - A Secure Single Step Authentication for User Authoriz...
Visual Authentication - A Secure Single Step Authentication for User Authoriz...Visual Authentication - A Secure Single Step Authentication for User Authoriz...
Visual Authentication - A Secure Single Step Authentication for User Authoriz...
 
Visual Authentication - A Secure Single Step Authentication for User Authoriz...
Visual Authentication - A Secure Single Step Authentication for User Authoriz...Visual Authentication - A Secure Single Step Authentication for User Authoriz...
Visual Authentication - A Secure Single Step Authentication for User Authoriz...
 
2010 EGITF Amsterdam - Gap between GRID and Humanities
2010 EGITF Amsterdam - Gap between GRID and Humanities2010 EGITF Amsterdam - Gap between GRID and Humanities
2010 EGITF Amsterdam - Gap between GRID and Humanities
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
 
Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...
 
Towards a Community-driven Data Science Body of Knowledge – Data Management S...
Towards a Community-driven Data Science Body of Knowledge – Data Management S...Towards a Community-driven Data Science Body of Knowledge – Data Management S...
Towards a Community-driven Data Science Body of Knowledge – Data Management S...
 
Emerging Web Technologies October 2013
Emerging Web Technologies October 2013Emerging Web Technologies October 2013
Emerging Web Technologies October 2013
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application Areas
 
Project COLA - Cloud Orchestration at the Level of Application - Introductio...
Project COLA - Cloud Orchestration at the Level of Application -  Introductio...Project COLA - Cloud Orchestration at the Level of Application -  Introductio...
Project COLA - Cloud Orchestration at the Level of Application - Introductio...
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 Calls
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Trustworthy Infrastructure for Personal Data Management

  • 1. Trustworthy Infrastructure for PDM Digital Enlightenment Forum 2013 Brussels, 18-20 Sept. 2013 Ioannis Krontiris Goethe University Frankfurt
  • 2. Privacy-ABCs • Benefits of Privacy-ABCs – Privacy-ABCs are by default untraceable (no user-tracking) – Enable minimal disclosure (user reveals only the necessary information) – User can chose to stay anonymous or generate (unlimited number of) pseudonyms – Advanced security (no sharing of credentials, device-binding for extra protection) • ABC4Trust objectives: A common, unified architecture for ABC systems to enable – Comparing their respective features – Combining them on common platforms – reference implementation – 2 pilots – “Lock-In” free usage of ABC systems • Raise trust in privacy-ABC technologies http://abc4trust.eu/
  • 3. ABC4Trust - About • Scheduled duration: November 2010 – February2015 • Funding: The ABC4Trust project receives research funding from the European Union's Seventh Framework Programme under grant agreement n° 257782 as part of the “ICT Trust and Security Research” theme. • Web Page: www.abc4trust.eu
  • 4. ABC4Trust @GitHub • https://github.com/p2abcen gine/ • Source codes available under Apache license • Documentation, installation guide and wiki pages
  • 5. Pilot Applications • Norrtullskolan School, Söderhamn, Sweden • School internal social network for communication among pupils, teachers, and personnel • Sept 2013 – Dec 2013 • University of Patras, Greece • Course ratings conducted anonymously without lecturers knowing participants’ identities • Conduct polls based on attendance • Oct 2013 – Jan 2014
  • 6. Privacy-ABCs and eIDs • eID cards a gateway to personal information with risks to the privacy of citizens – Build privacy-respecting architectures that prevent tracking of the citizen • Achieving international interoperability is an important goal – Build privacy preserving solutions that can be deployed for trans-border uses within the EU
  • 7. Challenges ahead • Address usability issues – innovative tools, such as “virtual care-takers,” to empower users make decisions that they cannot understand or evaluate properly • Address engineering problems – integrating privacy technologies on large scale deployments is still ill understood – examine methods of evaluation, criteria and metrics • Address continuously new data collection practices and data flows – Data treated by cloud-based applications – Sensors that collect personal information
  • 8. Ioannis Krontiris {ikrontiris@gmx.de}, Goethe University Frankfurt, Germany Thank you!