SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
1Sven Wohlgemuth On Privacy by Observable Delegation of Personal Data
National Institute of Informatics
Privacy in e-Health



Observing Disclosure of X-Ray Images to Third Parties by Using Digital
Watermarking



ISSI 2009

September 30th, 2009
Dr. Sven Wohlgemuth
Prof. Dr. Noboru Sonehara
Prof. Dr. Isao Echizen
National Institute of Informatics, Japan
Prof. Dr. Günter Müller
University of Freiburg, Germany
National Institute of Informatics
2
National Institute of Informatics
Scenario: Telemedicine
Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Privacy promise:
All personal data will be handled according to legislation and agreed privacy policy
between users and services.
2
National Institute of Informatics
Scenario: Telemedicine
Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
?
Privacy promise:
All personal data will be handled according to legislation and agreed privacy policy
between users and services.
3Dr. Sven Wohlgemuth
National Institute of Informatics
Privacy and Business Processes
Patient
DP
d
DC
Privacy legislation:
„Privacy is the claim of individuals, groups and institutions to determine for themselves, when,
how and to what extent information about them is communicated to others.“
(Westin 1967, EU/Germany, Japan, HIPAA)
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
3Dr. Sven Wohlgemuth
National Institute of Informatics
Privacy and Business Processes
Problem: No control for disclosure of personal data
Patient
DP
d
Privacy legislation:
„Privacy is the claim of individuals, groups and institutions to determine for themselves, when,
how and to what extent information about them is communicated to others.“
(Westin 1967, EU/Germany, Japan, HIPAA)
Pretschner, A., Hilty, M., and Basin, D. 2006.
DP = Data provider
DC = Data consumer
d,d’ = Personal dataDisclosure of personal data
d, d’
d, d’
DC / DP
Services
DC / DP
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
4Dr. Sven Wohlgemuth
National Institute of Informatics
Privacy-Enhancing Technologies: State of the Art
• Anonymity (Anonymizer, Mix network)
• Identity Management 

(Liberty Alliance, Shibboleth, iManager, 

IBM idemix)
• Policy language for provisions

(P3P)
• Digital Rights Management 

(Digital Privacy Management)
• Policy languages for obligations

(IBM EPAL, NAPS)
• Sticky policies

(HP Adaptive Privacy Management
System)
DC / DP
DC / DPDP
d
Patient
d, d’ d, d’
Services
• Delegation of rights (DREISAM)
+ Audit trail by digital watermarking 

(DETECTIVE)
Collection Disclosure to 3rd Parties
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., 2008
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
Rights 1
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
Rights 1
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
d
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
Rights 2
d
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
d’
d
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
d
d’
d’
d
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
6
National Institute of Informatics
DETECTIVE: Proof-of-Concept Implementation
Dr. Sven Wohlgemuth
Basic modules Use of existing modules Realizing DETECTIVE protocols
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Dr. Sven Wohlgemuth
2009 Postdoc scholar at NII funded by DAAD (German Academic Exchange Service)

Project: Enforcement of Privacy-Compliant Disclosure of Personal Data

Member of ISSI 2009 organizing committee
2008 Doctoral graduation at University of Freiburg, Germany (Prof. Dr. Günter Müller)

Thesis: Privacy with Delegation of Rights
2000 Diploma graduation at University of Saarbrücken, Germany (Prof. Dr. Birgit Pfitzmann, Tom Beiler)

Thesis: Key Management – Object-Oriented Design and Implementation
2006/08 Member of SICHERHEIT 2008 and ETRICS 2006 conferences’ organizing committee
2006-08 Founding Coordinator of working group “Privacy in Business Processes” of European Network of
Excellence “Future of Identity in the Information Society (FIDIS)”
2001-06 Coordinator of German research priority programme “Security in Information and Communication
Technology (SPP 1079)” funded by the German Research Foundation (DFG)
2003 doIT Software-Award 2003 by German Federal State “Baden-Württemberg” for “Usability and
Security by Identity Management”
7
National Institute of Informatics
Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
National Institute of Informatics
2-1-2 Hitotsubashi, Chiyoda-ku
Tokyo 101-8430
Japan
Phone: +81 3 4212 2594
Fax: +81 3 3556 1916
E-mail: wohlgemuth@nii.ac.jp
WWW: www.nii.ac.jp

Weitere ähnliche Inhalte

Ähnlich wie Privacy in e-Health

Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Sven Wohlgemuth
 
European Journal Epractice Volume 8.6
European Journal Epractice Volume 8.6European Journal Epractice Volume 8.6
European Journal Epractice Volume 8.6
ePractice.eu
 
Outline D
Outline DOutline D
Outline D
butest
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
journalBEEI
 
Image data beyond radiology: new developments
Image data beyond radiology: new developmentsImage data beyond radiology: new developments
Image data beyond radiology: new developments
Erik R. Ranschaert, MD, PhD
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
DaliaCulbertson719
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
Springer
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
Sofie van der Meulen
 
CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECA webinar slides: Ethical, legal and societal issues in international da...CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECAProject
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
makdul
 

Ähnlich wie Privacy in e-Health (20)

Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage Control
 
European Journal Epractice Volume 8.6
European Journal Epractice Volume 8.6European Journal Epractice Volume 8.6
European Journal Epractice Volume 8.6
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
 
Outline D
Outline DOutline D
Outline D
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackers
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 
Image data beyond radiology: new developments
Image data beyond radiology: new developmentsImage data beyond radiology: new developments
Image data beyond radiology: new developments
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
 
Towards Privacy by Design in Personal e-Health Systems
Towards Privacy by Design in Personal e-Health SystemsTowards Privacy by Design in Personal e-Health Systems
Towards Privacy by Design in Personal e-Health Systems
 
Medical Imaging: 8 Opportunities for technology entrepreneurs and investors
Medical Imaging: 8 Opportunities for technology entrepreneurs and investorsMedical Imaging: 8 Opportunities for technology entrepreneurs and investors
Medical Imaging: 8 Opportunities for technology entrepreneurs and investors
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
Privacy concerns in a remote monitoring and social networking platform for as...
Privacy concerns in a remote monitoring and social networking platform for as...Privacy concerns in a remote monitoring and social networking platform for as...
Privacy concerns in a remote monitoring and social networking platform for as...
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECA webinar slides: Ethical, legal and societal issues in international da...CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECA webinar slides: Ethical, legal and societal issues in international da...
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
 

Mehr von Sven Wohlgemuth

Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
Sven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Sven Wohlgemuth
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
Sven Wohlgemuth
 

Mehr von Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
 

Kürzlich hochgeladen

Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
levieagacer
 
CYTOGENETIC MAP................ ppt.pptx
CYTOGENETIC MAP................ ppt.pptxCYTOGENETIC MAP................ ppt.pptx
CYTOGENETIC MAP................ ppt.pptx
Silpa
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
NazaninKarimi6
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
seri bangash
 
Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.
Silpa
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
Silpa
 

Kürzlich hochgeladen (20)

Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
CYTOGENETIC MAP................ ppt.pptx
CYTOGENETIC MAP................ ppt.pptxCYTOGENETIC MAP................ ppt.pptx
CYTOGENETIC MAP................ ppt.pptx
 
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate ProfessorThyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICEPATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Atp synthase , Atp synthase complex 1 to 4.
Atp synthase , Atp synthase complex 1 to 4.Atp synthase , Atp synthase complex 1 to 4.
Atp synthase , Atp synthase complex 1 to 4.
 
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
 
Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.
 
Genome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxGenome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptx
 
Chemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdfChemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdf
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
 

Privacy in e-Health

  • 1. 1Sven Wohlgemuth On Privacy by Observable Delegation of Personal Data National Institute of Informatics Privacy in e-Health
 
 Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
 
 ISSI 2009
 September 30th, 2009 Dr. Sven Wohlgemuth Prof. Dr. Noboru Sonehara Prof. Dr. Isao Echizen National Institute of Informatics, Japan Prof. Dr. Günter Müller University of Freiburg, Germany National Institute of Informatics
  • 2. 2 National Institute of Informatics Scenario: Telemedicine Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Privacy promise: All personal data will be handled according to legislation and agreed privacy policy between users and services.
  • 3. 2 National Institute of Informatics Scenario: Telemedicine Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking ? Privacy promise: All personal data will be handled according to legislation and agreed privacy policy between users and services.
  • 4. 3Dr. Sven Wohlgemuth National Institute of Informatics Privacy and Business Processes Patient DP d DC Privacy legislation: „Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others.“ (Westin 1967, EU/Germany, Japan, HIPAA) Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
  • 5. 3Dr. Sven Wohlgemuth National Institute of Informatics Privacy and Business Processes Problem: No control for disclosure of personal data Patient DP d Privacy legislation: „Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others.“ (Westin 1967, EU/Germany, Japan, HIPAA) Pretschner, A., Hilty, M., and Basin, D. 2006. DP = Data provider DC = Data consumer d,d’ = Personal dataDisclosure of personal data d, d’ d, d’ DC / DP Services DC / DP Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
  • 6. 4Dr. Sven Wohlgemuth National Institute of Informatics Privacy-Enhancing Technologies: State of the Art • Anonymity (Anonymizer, Mix network) • Identity Management 
 (Liberty Alliance, Shibboleth, iManager, 
 IBM idemix) • Policy language for provisions
 (P3P) • Digital Rights Management 
 (Digital Privacy Management) • Policy languages for obligations
 (IBM EPAL, NAPS) • Sticky policies
 (HP Adaptive Privacy Management System) DC / DP DC / DPDP d Patient d, d’ d, d’ Services • Delegation of rights (DREISAM) + Audit trail by digital watermarking 
 (DETECTIVE) Collection Disclosure to 3rd Parties Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., 2008
  • 7. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services Rights 1 Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 8. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services Rights 1 Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 9. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services d Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 10. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services Rights 2 d Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 11. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services d’ d Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 12. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services d d’ d’ d Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 13. 6 National Institute of Informatics DETECTIVE: Proof-of-Concept Implementation Dr. Sven Wohlgemuth Basic modules Use of existing modules Realizing DETECTIVE protocols Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
  • 14. Dr. Sven Wohlgemuth 2009 Postdoc scholar at NII funded by DAAD (German Academic Exchange Service)
 Project: Enforcement of Privacy-Compliant Disclosure of Personal Data
 Member of ISSI 2009 organizing committee 2008 Doctoral graduation at University of Freiburg, Germany (Prof. Dr. Günter Müller)
 Thesis: Privacy with Delegation of Rights 2000 Diploma graduation at University of Saarbrücken, Germany (Prof. Dr. Birgit Pfitzmann, Tom Beiler)
 Thesis: Key Management – Object-Oriented Design and Implementation 2006/08 Member of SICHERHEIT 2008 and ETRICS 2006 conferences’ organizing committee 2006-08 Founding Coordinator of working group “Privacy in Business Processes” of European Network of Excellence “Future of Identity in the Information Society (FIDIS)” 2001-06 Coordinator of German research priority programme “Security in Information and Communication Technology (SPP 1079)” funded by the German Research Foundation (DFG) 2003 doIT Software-Award 2003 by German Federal State “Baden-Württemberg” for “Usability and Security by Identity Management” 7 National Institute of Informatics Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku Tokyo 101-8430 Japan Phone: +81 3 4212 2594 Fax: +81 3 3556 1916 E-mail: wohlgemuth@nii.ac.jp WWW: www.nii.ac.jp