SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Privacy Enhancing Technologies Privacy and Identity Management for Everyone B. Sc. Amir Neziri Technische Universität Darmstadt [email_address] Advisor:  Prof. Dr. Katzenbeisser
Motivation – Privacy Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Motivation – Current Solutions ,[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
A Need for Change ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Prime‘s Vision ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Prime‘s Vision ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
The Prime Solution – The Parties  ,[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
The Prime Solution – Cryptographic Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
The Prime Solution – Cryptographic Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
The Prime Solution-  Architecture 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Software Architecture of a party [primeAr]
The Prime Solution-  Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
RDF Example 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri RDF/XML Notation of the same RDF Example [tudres]
The Prime Solution- Architecture 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri High-level Component  Architecture [primeAr]
The Prime Solution- Architecture 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri High-level Component  Architecture [primeAr]
The Prime Solution- Architecture 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri High-level Component  Architecture [primeAr]
The Prime Solution-Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
The Prime Solution-Architecture ,[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Example <condition> in XML-format (based on [EPAL])
A Sample Transaction 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Negotiation– Phase I 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Negotiation– Phase I ,[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Negotiation– Phase I ,[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Example: XACML Request Model 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Structure of an XACML request (based on [Oas05])
Example: XACML Response Model 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Structure of an XACML response (based on [Oas05])
Contract Execution– Phase II 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Contract Execution– Phase II ,[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Contract Execution– Phase II ,[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Example: XACML Policy Element 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Structure of a Policy (based on [Oas05])
Example: XACML Rule Element 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Structure of a Rule (based on [Oas05])
Example: EPAL Authorization Request 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Example authorization request in XML-format (based on [EPAL])
Example: EPAL Authorization Response 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Example authorization result in XML-format (based on [EPAL])
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
Questions??? 06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
References ,[object Object],[object Object],[object Object],[object Object],[object Object],06/15/2011 | Department 20  | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri

Weitere ähnliche Inhalte

Andere mochten auch

Sichere Handy-Ortung zur Unterstützung des Katastrophenmanagements auf Basis ...
Sichere Handy-Ortung zur Unterstützung des Katastrophenmanagements auf Basis ...Sichere Handy-Ortung zur Unterstützung des Katastrophenmanagements auf Basis ...
Sichere Handy-Ortung zur Unterstützung des Katastrophenmanagements auf Basis ...Amir Neziri
 
Secure Mobile Cloud Service for personal data with web frontend based on HTML5
Secure Mobile Cloud Service for personal data with web frontend based on HTML5Secure Mobile Cloud Service for personal data with web frontend based on HTML5
Secure Mobile Cloud Service for personal data with web frontend based on HTML5Amir Neziri
 
Quellcode Analyse
Quellcode AnalyseQuellcode Analyse
Quellcode AnalyseAmir Neziri
 
Software(runtime) attacks
Software(runtime) attacksSoftware(runtime) attacks
Software(runtime) attacksAmir Neziri
 
Security of Web Servers and Web Applications
Security of Web Servers and Web ApplicationsSecurity of Web Servers and Web Applications
Security of Web Servers and Web ApplicationsAmir Neziri
 

Andere mochten auch (6)

Sichere Handy-Ortung zur Unterstützung des Katastrophenmanagements auf Basis ...
Sichere Handy-Ortung zur Unterstützung des Katastrophenmanagements auf Basis ...Sichere Handy-Ortung zur Unterstützung des Katastrophenmanagements auf Basis ...
Sichere Handy-Ortung zur Unterstützung des Katastrophenmanagements auf Basis ...
 
Secure Mobile Cloud Service for personal data with web frontend based on HTML5
Secure Mobile Cloud Service for personal data with web frontend based on HTML5Secure Mobile Cloud Service for personal data with web frontend based on HTML5
Secure Mobile Cloud Service for personal data with web frontend based on HTML5
 
Quellcode Analyse
Quellcode AnalyseQuellcode Analyse
Quellcode Analyse
 
Software(runtime) attacks
Software(runtime) attacksSoftware(runtime) attacks
Software(runtime) attacks
 
Security of Web Servers and Web Applications
Security of Web Servers and Web ApplicationsSecurity of Web Servers and Web Applications
Security of Web Servers and Web Applications
 
Ganji-ID-5305
Ganji-ID-5305Ganji-ID-5305
Ganji-ID-5305
 

Ähnlich wie Privacy and identity management for everyone

Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
Steve Wood Generative AI and Data Protection Asia Privacy Bridge October 202...
Steve Wood Generative AI and Data Protection Asia Privacy Bridge  October 202...Steve Wood Generative AI and Data Protection Asia Privacy Bridge  October 202...
Steve Wood Generative AI and Data Protection Asia Privacy Bridge October 202...stevewood900540
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summitElsa Prieto
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayEurotech
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...IBM_Info_Management
 
Webinar slides - Internet of Things Convergence: Preparatory Studies
Webinar slides - Internet of Things Convergence: Preparatory StudiesWebinar slides - Internet of Things Convergence: Preparatory Studies
Webinar slides - Internet of Things Convergence: Preparatory StudiesCreative Industries KTN
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Cloud Computing Forensic Science
 Cloud Computing Forensic Science  Cloud Computing Forensic Science
Cloud Computing Forensic Science David Sweigert
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...e-SIDES.eu
 
Security in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeSecurity in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeServiceWave 2010
 
Sampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminarSampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminarAlmereDataCapital
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of ThingsForgeRock
 

Ähnlich wie Privacy and identity management for everyone (20)

Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
The fourth industrial revolution
The fourth industrial revolutionThe fourth industrial revolution
The fourth industrial revolution
 
Steve Wood Generative AI and Data Protection Asia Privacy Bridge October 202...
Steve Wood Generative AI and Data Protection Asia Privacy Bridge  October 202...Steve Wood Generative AI and Data Protection Asia Privacy Bridge  October 202...
Steve Wood Generative AI and Data Protection Asia Privacy Bridge October 202...
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT Gateway
 
Ash cis 500 preview full class
Ash cis 500 preview full classAsh cis 500 preview full class
Ash cis 500 preview full class
 
DAPSI - Open Call #1 - Webinar #4
DAPSI - Open Call #1 - Webinar #4DAPSI - Open Call #1 - Webinar #4
DAPSI - Open Call #1 - Webinar #4
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
 
Webinar slides - Internet of Things Convergence: Preparatory Studies
Webinar slides - Internet of Things Convergence: Preparatory StudiesWebinar slides - Internet of Things Convergence: Preparatory Studies
Webinar slides - Internet of Things Convergence: Preparatory Studies
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Cloud Computing Forensic Science
 Cloud Computing Forensic Science  Cloud Computing Forensic Science
Cloud Computing Forensic Science
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
 
Security in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeSecurity in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike Surridge
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Sampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminarSampo Kellomäki (Synergetics) @ PIDS seminar
Sampo Kellomäki (Synergetics) @ PIDS seminar
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 

Kürzlich hochgeladen

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Kürzlich hochgeladen (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Privacy and identity management for everyone

  • 1. Privacy Enhancing Technologies Privacy and Identity Management for Everyone B. Sc. Amir Neziri Technische Universität Darmstadt [email_address] Advisor: Prof. Dr. Katzenbeisser
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. The Prime Solution- Architecture 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Software Architecture of a party [primeAr]
  • 12.
  • 13. RDF Example 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri RDF/XML Notation of the same RDF Example [tudres]
  • 14. The Prime Solution- Architecture 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri High-level Component Architecture [primeAr]
  • 15. The Prime Solution- Architecture 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri High-level Component Architecture [primeAr]
  • 16. The Prime Solution- Architecture 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri High-level Component Architecture [primeAr]
  • 17.
  • 18.
  • 19. A Sample Transaction 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
  • 20. Negotiation– Phase I 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
  • 21.
  • 22.
  • 23. Example: XACML Request Model 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Structure of an XACML request (based on [Oas05])
  • 24. Example: XACML Response Model 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Structure of an XACML response (based on [Oas05])
  • 25. Contract Execution– Phase II 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
  • 26.
  • 27.
  • 28. Example: XACML Policy Element 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Structure of a Policy (based on [Oas05])
  • 29. Example: XACML Rule Element 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Structure of a Rule (based on [Oas05])
  • 30. Example: EPAL Authorization Request 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Example authorization request in XML-format (based on [EPAL])
  • 31. Example: EPAL Authorization Response 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri Example authorization result in XML-format (based on [EPAL])
  • 32.
  • 33. Questions??? 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
  • 34. 06/15/2011 | Department 20 | Prof. Dr. Katzenbeisser | Privacy Enhancing Technologies | Amir Neziri
  • 35.

Hinweis der Redaktion

  1. 2/3/2011 | |
  2. Frage an Zuhörer : Was kann alles mit Persönlichen Daten geschehen???? 2/3/2011 | |
  3. Frage: Weiß jeder, dass jeder von euch das Recht hat, nach euren Daten zu fragen???? 2/3/2011 | |
  4. 2/3/2011 | |
  5. ein Benutzer kann zur Rechenschaft gezogen für den Missbrauch des Systems oder zu betrügen, auch obwohl Transaktionen &amp;quot;anonymen&amp;quot;. 2/3/2011 | |
  6. 2/3/2011 | |
  7. Frage an Zuhörer: Wie erreichen wir Anonymous Communication???? Cryptographic pseudonyms such as Idemix pseudonyms 2/3/2011 | |
  8. Traditional certificates have the drawback that different uses of the same certificate can be linked to each other 2/3/2011 | |
  9. as the language for describing information about the resources in our system 2/3/2011 | |
  10. More specifically, the IC component (a) delegates requests to the AC, (b) handles all credential-related protocols, (c) automatically computes optimal ways to fulfill a request, and (d) manages user input and notification via the graphical user interface. 2/3/2011 | |
  11. Obligation=Verpfilichtung In the example given in Figure 4.2.4 an implementation of an EPAL policy condition is shown consisting of one predicate representing a Boolean function. Here, a container named &apos;DataUserInfo&apos; and a string-type attribute named &apos;DataUserID&apos; is given. Therefore, the condition of the value of the latter attribute must be equal to &apos;John Doe&apos;. 2/3/2011 | |
  12. The user requests information about a product from a service provider. 2. The request is received by the service provider and directed to the AC component. The AC component returns an offer which includes a description of the product, a list of requirements in order to buy the product along with corresponding reasons for each of the requirements. The list of requirements can include the price, a request for the user’s address, billing information, phone number, etc. The list of reasons can explain why certain information, such as a phone number, has been requested. The offer also specifies how the data related to this transaction will be treated. This is done by expressing the service provider’s privacy policy for the data categories being requested. In particular, the service provider presents obligations to the user that will be automatically enforced. The service provider’s AC may also reply with multiple offers for the same product. For example, there can be a standard offer with the retail price, and a special offer with a reduced price which requires that the user provide a loyalty program number. 2/3/2011 | |
  13. The user’s IC component receives the offer and parses it. Each of the requirements are presented to the user’s AC in order to determine the counter-requirements for the release of the requested information. The IC may add obligations to the offer, for example, it may add the obligation that the company notify the user whenever the transaction data is transferred to a third party. The IC presents the possible choices about how the requirements are to be fulfilled to the user via the GUI. For example, a user might have to choose between multiple offers, or choose between various ways to fulfill a requirement (i.e, by using driver’s license versus passport). For convenience, the user can configure certain choices to be made automatically (e.g., if possible, use e-coins to fulfill a payment, and otherwise use a credit card). The agreed privacy policy and obligations are presented to the user in an easy-to-understand representation. The user finally has to give their informed consent to the data processing. 2/3/2011 | |
  14. eXtensible Access Control Markup Language 2/3/2011 | |
  15. 1. Company sends necessary credentials to the user. 2. User’s IC uses the received credentials to access user’s information via the AC. The AC responds with the requested data. (If the access policy has changed between the time at which the contract was accepted and the time of this access, the user must decide how to proceed.) The IC “packages” the requested data and sends it back to the company. This can involve interactive protocols in which credentials are shown or simple transmissions of uncertified declarations. 2/3/2011 | |
  16. 3. The company’s IC processes the requested data and determines whether the requested information satisfies the contract. If so, the IC requests the AC to store specific parts of the user data under an access control policy that enforces the agreed privacy policy and to store the related obligations in the OM. The OM activates each obligation meaning that they can noe be triggered by appropriate events and conditions. The IC also triggers any business processes related to the transaction (e.g., to deposit the e-coins and to ship the good to the user). 4. The OM handles any obligations whose conditions have been triggered. For example, when the company relays the user’s address to the shipping company, the OM informs the user that such information has been transferred. Obligations can either be completely orthogonal to any services-side accesses to the user’s data (e.g., time-driven deletion) or can be related to such accesses as in the example. 2/3/2011 | |
  17. Enterprise Authorization Language 2/3/2011 | |
  18. 2/3/2011 | |
  19. 2/3/2011 | |