A privacy-enhancing technology:
|
|
- Kelly Ball
- 5 years ago
- Views:
Transcription
1 A privacy-enhancing technology: sticky policies Privacy-Enhancing Technologies / DD3344 Guillermo Rodríguez Cano Stockholm, November 12th, 2012
2 what are they? how do they work? what are their problems? do they have alternatives?
3 technological support for accountability 2
4 What are sticky policies?
5 committed obligations 4
6 Committed obligations conditions and constraints decided by a data owner to describe how its personal identifiable information should be treated by a receiver Many different types access control privacy obligation... Written in many languages Add a new level of complexity 5
7 <data pa ckage> <data component> // Identity and profile - attribute 1 <sticky policy> // disclosure policy IBE public key <Trusted Authority> address and location of the Trusted Authority </Trusted Authority> <owner> <reference name> pseudonym1 </reference name> //reference name IBE public key <owner s details> encrypted call back address <owner s details> //encrypted call back address //by using the user s reference name </owner> <target> name of the identity or profile attribute </target> <validity> //validity expiration date </validity> <constraint> //constraints require_strong_x.509_authentication </constraint> <constraint> allow_sharing_of_data </constraint> <action> //actions notify_owner </action> </sticky policy> <encrypted data> encrypted attribute value, using the above policy as IBE public key </encrypted data> </data component> </data package> Committed obligations 5
8 actors 6
9 Data owner Actors discloses personal identifiable information (PII) expresses privacy consents when disclosing PII by opting in and out Trust Authority (TA) entity checking integrity and trustworthiness of requestor s credentials, and environment according to specified sticky policies provides accountability, tracing and auditing information of owner s data access and usage Policy Enforcement Point (PEP) stores and provides access to PII via the TA guarantees to the TA the acceptance, satisfaction and enforcement of the sticky policies 7
10 How do sticky policies work?
11 Do they have any problem?
12 policy enforcement 10
13 Policy enforcement enforcement cannot be guaranteed and prevention of policy modification cannot be guaranteed either Cheating breaking promises to the TA Logical unbinding owner s data is fully available once binding has been broken 11
14 public-key encryption 12
15 Using Public-Key Encryption (PKE) data owner encrypts a message mi using the receiver s public key PKidr Policy enforcement by the data owner validate receiver s public key, PKidr send {idr, condition, E(mi, PKidr)} to the PEP Policy enforcement by the PEP validate that condition holds send {E(mi, PKidr)} to idr 13
16 Expressiveness Using Public-Key Encryption (PKE) PKE certificates are issued with respect to the user s identity Requirements on TA validation of receiver s public key by data owner Requirements on PEP semi-trusted Policy and key updating update condition in idr, condition, E(mi, PKidr) for any, idr, condition, E(mi, PKidr), if idr changes to ids, data owner needs to generate E(mi, PKids) again and let PEP replace it where appropriate if SKidr is compromised, all associated rules with idr shall be updated 14
17 identity-based encryption 15
18 Using Identity-Based Encryption (IBE) data owner encrypts a message mi using the receiver s IBE identity Policy enforcement by the data owner validate TA s public key, PKTA send {idr, condition, E(mi, idr)} to the PEP Policy enforcement by the PEP validate that condition holds send {idr, E(mi, idr)} to idr Policy enforcement by the TA validate the identity idr send SKidr to idr 16
19 Using Identity-Based Encryption (IBE) Expressiveness more constraints can be embedded into receiver s IBE identity Requirements on TA should be on-line for receiver s requests and identity provisioning Requirements on PEP semi-trusted (as in PKE) Policy and key updating update condition in idr, condition, E(mi, idr) for any, idr, condition, E(mi, PKidr), if idr changes to ids, data owner needs to generate E(mi, idr) again and let PEP replace it where appropriate if SKidr is compromised, all associated rules with idr shall be updated 17
20 attribute-based encryption 18
21 Using Attribute-Based Encryption (ABE) data owner encrypts the message mi based on an access structure! Policy enforcement by the data owner validate TA s public key, PKTA send {!, condition, E(mi,!, PKTA)} to the PEP Policy enforcement by the PEP validate that condition holds send {!, E(mi,!, PKTA)} to idr 19
22 Expressiveness Using Attribute-Based Encryption (ABE) finer-grained than PKE and IBE but less expressive than IBE Requirements on TA provides information about available attributes for the definition of! Requirements on PEP semi-trusted (an adversary should not be able to decrypt mi) Policy and key updating update condition in!, condition, E(mi,!, PKTA) for any {!, condition, E(mi,!, PKTA)} if! changes to!*, data owner needs to generate E(mi,!*, PKTA) again and let PEP replace it where appropriate if private keys associated with! are compromised, all associated rules with any attribute in! shall be updated 20
23 proxy re-encryption 21
24 Using Proxy Re-Encryption (PRE) user encrypts a message mi using its own public key PKida and enforce its policy by assigning a re-encryption key to the PEP Policy enforcement by the data owner obtain E(mi, PKida) validate receiver s public key, PKidr and TA s send {idr, condition, E(mi, PKida)} and the proxy reencryption key RKPKida PKidr to the PEP Policy enforcement by the PEP validate that condition holds send {Preenc(E(mi, PKida), RKPKida PKidr} to idr 22
25 Expressiveness Depends on TA s encryption scheme Requirements on TA Depends on the chosen encryption scheme Requirements on PEP Using Proxy Re-Encryption (PRE) higher trust is required (potential re-encryption of all messages) Policy and key updating update condition in {idr, condition, E(mi, PKida)} for any {idr, condition, E(mi, PKida)} if idr changes to ids, data owner needs to inform the PEP of the new ids if SKidr is compromised, all associated rules with idr shall be updated if SKida is compromised, data owner needs to generate a new key pair {PK*ida, SK*ida} and have the PEP replace every re-encryption key 23
26 proxy re-encryption 24
27 Using Proxy Re-Encryption (PRE) user encrypts a message mi using its own public key PKida and enforce its policy by assigning a re-encryption key to the PEP Policy enforcement by the data owner obtain E(mi, PKida) validate receiver s public key, PKidr and TA s send {idr, condition, E(mi, PKida)} and the proxy reencryption key RKPKida PKidr to the PEP Policy enforcement by the PEP validate that condition holds send {Preenc(E(mi, PKida), RKPKida PKidr} to idr 25
28 Expressiveness Depends on TA s encryption scheme Requirements on TA Depends on the chosen encryption scheme Requirements on PEP Using Proxy Re-Encryption (PRE) higher trust is required (potential re-encryption of all messages) Policy and key updating update condition in {idr, condition, E(mi, PKida)} for any {idr, condition, E(mi, PKida)} if idr changes to ids, data owner needs to inform the PEP of the new ids if SKidr is compromised, all associated rules with idr shall be updated if SKida is compromised, data owner needs to generate a new key pair {PK*ida, SK*ida} and have the PEP replace every re-encryption key 26
29 Are there alternatives?
30 digital rights management 28
31 Digital Rights Management (DRM) assume receiver is a bad guy who wants to rip off owner s data Receiver is actually restricted in what it can do with the data when DRM are in place In particular, privacy (sticky) policies are assumed to be enforced by the receiver no matter what 29
32 trusted platforms 30
33 Trusted platforms provide better mechanisms and tools to check integrity of computing platforms and software installed Protect against theft and misuse of secrets held on the platform Guarantee that integrity of hardware and software can be checked locally and remotely (used to deduce the level of trust) Provide mechanism to prove that computing scenario is a trusted platform while maintaining anonymity (if required) 31
34 Questions? Otherwise... thanks :)
35 Sources Casassa Mont, Marco, Vaibhav Sharma, and Siani Pearson. "EnCoRe: Dynamic Consent, Policy Enforcement and Accountable Information Sharing within and across Organisations., 2012 Pearson, Siani. "Privacy Management in Global Organisations." In Communications and Multimedia Security, pp Springer Berlin/Heidelberg, 2012 Pearson, Siani, and Marco Casassa Mont. "Sticky Policies: An Approach for Managing Privacy across Multiple Parties." In Computer 44.9, pp IEEE, 2011 Tang, Qiang. "On using encryption techniques to enhance sticky policies enforcement.", 2008 Mont, Marco Casassa, Siani Pearson, and Pete Bramhall. "Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services." In Database and Expert Systems Applications, Proceedings. 14th International Workshop on, pp IEEE,
36 cb All images are Creative Commons licensed Sourced from Flick.r Contact author for presentation license
Privacy-Preserving Management of Personal Data For Assisted-Living Applications
Privacy-Preserving Management of Personal Data For Assisted-Living Applications Gina Kounga, Marco Casassa Mont, Pete Bramhall Researcher 29 November 2010 1 of 18 Outline Context Problem statement Scenario
More informationPrivacy-Preserving Management of Personal Data For Assisted-Living Applications
Privacy-Preserving Management of Personal Data For Assisted-Living Applications Gina Kounga Hewlett-Packard Laboratories Long Down Avenue Stoke Gifford Bristol BS34 8QZ United Kingdom Email: Gina.Kounga@hp.com
More informationADMA Briefing Summary March
ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From
More informationDisclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates
Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...
More informationDr Nick Papanikolaou e-security Group International Digital Laboratory WMG, University of Warwick
Towards Integrated t Policy Management for Privacy Dr Nick Papanikolaou e-security Group International Digital Laboratory WMG, University of Warwick http://go.warwick.ac.uk/nikos Context t Joint work with
More informationPRIVACY POLICY Let us summarize this for you...
PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase
More informationTrusted Computing: Introduction & Applications
Trusted Computing: Introduction & Applications Lecture 5: Remote Attestation, Direct Anonymous Attestation Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt,
More informationSAFE-BioPharma RAS Privacy Policy
SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what
More informationCertificateless Public Key Cryptography
Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.
More informationHIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES
HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent
More informationOrganization information. When you create an organization on icentrex, we collect your address (as the Organization Owner), your
Privacy policy icentrex Sweden AB Privacy Policy Updated: November 3, 2017 This privacy policy is here to help you understand what information we collect at icentrex, how we use it, and what choices you
More informationContent. Privacy Policy
Content 1. Introduction...2 2. Scope...2 3. Application...3 4. Information Required...3 5. The Use of Personal Information...3 6. Third Parties...4 7. Security...5 8. Updating Client s Information...5
More informationFPKIPA CPWG Antecedent, In-Person Task Group
FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent
More information5G-ENSURE. Privacy Enablers. (Project Number )
5G-ENSURE (Project Number 671562) Privacy Enablers madalina.baltatu@telecomitalia.it luciana.costa@telecomitalia.it dario.lombardo@telecomitalia.it Privacy enhanced identity protection Privacy Enablers
More informationThis policy is a public document and has been prepared in light of the National Privacy Principle 5: Openness.
Privacy Policy: Wireless Life Pty Ltd trading as ISP Connect Effective: 11 November 2015 Wireless Life Pty Ltd t/as ISP Connect ( ISP Connect ) is committed to protecting the privacy of its customer s
More informationWe reserve the right to modify this Privacy Policy at any time without prior notice.
This Privacy Policy sets out the privacy policy relating to this site accessible at www.battleevents.com and all other sites of Battle Events which are linked to this site (collectively the Site ), which
More informationAoT: Authentication and Access Control for the Entire IoT Device Life-Cycle
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle Noura Alomar November 7th, 2018 1 AoT The AoT paper is one of the earliest and most cited papers on IoT defense and it considers
More informationContext-Aware Privacy Design Pattern Selection
Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Keyword(s): Privacy, Design Patterns, Context Awareness Abstract: User-related contextual factors affect
More informationHow do you decide what s best for you?
How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility
More informationTIX Privacy Policy. 1. Scope of this Privacy Policy. 2. What personal information does TIX collect? Updated 7 September 2015
TIX Privacy Policy Updated 7 September 2015 Tickets Pty Ltd owns and operates the website TIX.com.au and its associated sites Lasttix.com.au, Sportstix.com.au and Showbiz.com.au. We have created this Privacy
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationSecurity Requirements for Crypto Devices
Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements
More informationEarthlink and Google Final Contract Chart. Recommended Privacy and 1st Amendment Protections. Earthlink (monthly charge) Google (no fee)
and Final Contract Chart Privacy and 1st What personal information is collected about users? None, if possible. Anonymous and pseudonymous access should be available. contract regarding the type of information
More informationVERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT
VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the
More informationPTLGateway Data Breach Policy
1 PTLGateway Data Breach Policy Last Updated Date: 02 March 2018 Data Breach Policy This page informs you of our policy which is to establish the goals and the vision for the breach response process. This
More informationFIRESOFT CONSULTING Privacy Policy
FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING abides by the Australian Privacy Principles ( APPs ), which provides relative information to businesses in relation to the collection, disclosure,
More informationCovert Identity Information in Direct Anonymous Attestation (DAA)
Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de
More informationPRIVACY POLICY OUR SERVICES. Last modified: November 29, 2015
PRIVACY POLICY Last modified: November 29, 2015 Thank you for using Creatubbles. Creatubbles PTE. LTD and its affiliates ( Creatubbles ) values your privacy, and we want you to know what information we
More informationABSTRACT PRIVATE KEY ALLOCATION BASED ACCESS CONTROL SCHEME FOR SOCIAL NETWORKS. by Preethi Srinivas
ABSTRACT PRIVATE KEY ALLOCATION BASED ACCESS CONTROL SCHEME FOR SOCIAL NETWORKS by Preethi Srinivas The problem of sharing resources in a secure manner in a social network has been addressed by various
More informationCan eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010
Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security
More informationACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION
ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or
More informationPrivacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich
Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems Anja Lehmann IBM Research Zurich ROADMAP Anonymous Credentials privacy-preserving (user) authentication Pseudonym Systems privacy-preserving
More informationING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants
More informationCristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.
CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationTIX NZ Privacy Policy
TIX NZ Privacy Policy Updated 20 January 2016 Tickets Pty Ltd (Company Number 5636947) owns and operates the website TIX.nz and its associated sites Showbiznz.co.nz, Sportstix.nz, Lasttix.co.nz. We have
More informationHF Markets SA (Pty) Ltd Protection of Personal Information Policy
Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and
More informationGeneva, 6-7 December 2010 Addressing security challenges on a global scale
Geneva, 6-7 December 2010 Addressing security challenges on a global scale 1 Privacy & security issues for cloud computing services Heung Youl YOUM, PhD Vice-chair, ITU-T SG 17 Soonchunhyang University,
More informationLBI Public Information. Please consider the impact to the environment before printing this.
LBI Public Information. Please consider the impact to the environment before printing this. DGPC Framework People Executive management commitment Engaged management team Integrated governance organization
More informationMaking Decryption Accountable
Making Decryption Accountable Mark D. Ryan University of Birmingham Abstract. Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationOn the Security of Group-based Proxy Re-encryption Scheme
On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R 1, B B Amberker Department of Computer Science and Engineering National Institute of Technology Warangal Warangal, Andhra Pradesh-506004,
More informationUser Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe
User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant
More informationTrust Services Practice Statement
Trust Services Practice Statement TrustWeaver AB V. 1.2 PUBLIC Page 1 IMPORTANT LEGAL NOTICE Copyright 2016, TrustWeaver AB. All rights reserved. This document contains TrustWeaver AB proprietary information,
More informationKenex (Electro-Medical) Limited. Privacy Statement. Kenex (Electro-Medical) Limited (Kenex) have been in business for over 40 years and have
Kenex (Electro-Medical) Limited Privacy Statement Kenex (Electro-Medical) Limited (Kenex) have been in business for over 40 years and have established a reputation for providing high quality, well designed
More informationPrivacy Policy. What Information Is Collected? Internet Traffic Data
Privacy Policy Purple Tree Photography, doing business as Purple Tree Photography ( Purple Tree Photography, we or us ) is sensitive to concerns that personal information collected from its customers (
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationTHE BERKSHIRE ARCHERY COACHING GROUP PRIVACY NOTICE
Berkshire Archery Coaching Group Serving the Coaches of the County Association of Berkshire THE BERKSHIRE ARCHERY COACHING GROUP PRIVACY NOTICE Abstract This notice explains how the Berkshire Archery Coaching
More informationApple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
More informationVerifiability experiences in government online voting
Verifiability experiences in government online voting E-Vote-ID 2017 Jordi Puiggalí CSO and SVP of Research & Security Scytl Secure Electronic Voting October, 2017 Online voting security and verifiability
More informationThree Levels of Access Control to Personal Health Records in a Healthcare Cloud
Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United
More informationregister to use the Service, place an order, or provide contact information to an Independent Business Owner;
Privacy Policy Stella & Dot LLC (d/b/a Stella & Dot Family Brands, KEEP Collective, and EVER LLC) and its wholly-owned U.S. subsidiary, Stella & Dot Jewelry LLC (collectively, Stella & Dot, we, us, or
More informationEnCoRe Project Deliverable
EnCoRe Project Deliverable Title: Technical Architecture for the first realized Case Study Identifier: D2.1 Version: 1.0 Date: 10 February 2010 Status: Authors: Editor: Reviewers: Class: Final Marco Casassa
More informationOffice Properties Income Trust Privacy Notice Last Updated: February 1, 2019
General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information
More informationSELF SERVICE INTERFACE CODE OF CONNECTION
SELF SERVICE INTERFACE CODE OF CONNECTION Definitions SSI Administration User Identity Management System Identity Provider Service Policy Enforcement Point (or PEP) SAML Security Patch Smart Card Token
More informationAn Introduction to Trusted Platform Technology
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK Siani_Pearson@hp.com Content What is Trusted Platform technology and TCPA? Why is Trusted Platform technology
More informationStructure-Preserving Certificateless Encryption and Its Application
SESSION ID: CRYP-T06 Structure-Preserving Certificateless Encryption and Its Application Prof. Sherman S. M. Chow Department of Information Engineering Chinese University of Hong Kong, Hong Kong @ShermanChow
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More informationPresenter: Asim Sinan Yuksel. Submitted in Partial Fulfillment of the Course Requirements for. ECEN 689: Cyber Security of the Smart Grid, Spring 2011
A User-centric Privacy Manager for Future Energy Systems Authors: H. Simo Phom, Nicolai Kuntze, Carsten Rudolph, Marco Cupelli, Junqi Liu, Antonello Monti 2010 International Conference on Power System
More informationIdentity Management Systems An Overview. IST Event 2004 /
IST Event 2004 / 15.11.2004 Marit Hansen / Henry Krasemann Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany Overview Identity Management
More informationLET S ENCRYPT SUBSCRIBER AGREEMENT
Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationCloud Security Standards Supplier Survey. Version 1
Cloud Security Standards Supplier Survey Version 1 Document History and Reviews Version Date Revision Author Summary of Changes 0.1 May 2018 Ali Mitchell New document 1 May 2018 Ali Mitchell Approved Version
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationPRIVACY POLICY. We will use the information that we collect about you in accordance with:
PRIVACY POLICY The preservation of your privacy is important to Gingko and we are committed to letting you know how we use your personal information and to making only responsible use of your data. The
More informationXpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;
65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment
More informationmsis Security Policy and Protocol
msis Security Policy and Protocol Introduction This Policy details the secure use of msis as a tool for the capture and reporting of internet intelligence and investigations (i3). msis is a powerful i3
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationDECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE
DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority
More informationonly be used for the purpose of handling an individual transaction. The Personal Information you supply to us, when you opt in to marketing
Privacy The Phoenix Theatre, Blyth Privacy Policy 1. Privacy commitment The website www.thephoenixtheatre.org.uk is owned and operated by The Phoenix Theatre, Blyth. We are committed to safeguarding your
More informationetouches, Inc. Privacy Policy
etouches, Inc. Privacy Policy Effective Date: March 1, 2017 This privacy policy applies to etouches, Inc. ( etouches ) and covers the site, www.etouches.com corporate site and application(s) accessed via
More informationPrivacy Policy. Optimizely, Inc. 1. Information We Collect
Privacy Policy Posted: Nov. 19, 2015; Effective Date: Nov. 19, 2015 Optimizely, Inc. This privacy policy applies to Optimizely s Virtual Experience website owned and/or operated for Optimizely, Inc., currently
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that
More informationSecuring APIs and Microservices with OAuth and OpenID Connect
Securing APIs and Microservices with OAuth and OpenID Connect By Travis Spencer, CEO @travisspencer, @curityio Organizers and founders ü All API Conferences ü API Community ü Active blogosphere 2018 Platform
More informationBCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)
BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line
More informationB. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc.
DELANCEYPLACE.COM LLC PRIVACY POLICY DELANCEYPLACE.COM, LLC and its affiliates ( DelanceyPlace, we or us ) operate a website and related social network along with all related applications, software, daily
More informationAvira Certification Authority Policy
Avira Certification Authority Policy Version: 1.0 Status: Draft Updated: 2010-03-09 Copyright: Avira GmbH Author: omas Merkel Introduction is document describes the Certification Policy (CP) of Avira Certification
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust
More informationPalo Alto Networks PAN-OS
RSA Security Analytics Ready Implementation Guide Partner Information Last Modified: November 24 th, 2014 Product Information Partner Name Palo Alto Networks Web Site www.paloaltonetworks.com Product Name
More informationISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY
ISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY November 2009 Version 1.0 In light of the announcement of a series of federal pilots for federated identity providers, we have analyzed the governance and policy
More informationWonde may collect personal information directly from You when You:
Privacy Policy Updated: 17th April 2018 1. Scope At Wonde, we take privacy very seriously. We ve updated our privacy policy ( Policy ) to ensure that we communicate to You, in the clearest way possible,
More informationEnterprise Privacy and Federated Identity Management
Enterprise Privacy and Federated Identity Management Michael Waidner IBM Zurich Research Lab & IBM Privacy Research Institute April 2003 Outline 1. Motivation 2. Enterprise Privacy Management 3. Federated
More informationNWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2
NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: St. Thomas University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationImplementation Guide for Delivery Notification in Direct
Implementation Guide for Delivery Notification in Direct Contents Change Control... 2 Status of this Guide... 3 Introduction... 3 Overview... 3 Requirements... 3 1.0 Delivery Notification Messages... 4
More informationSecurity protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i
Security protocols Logical representation and analysis of protocols.i A security protocol is a set of rules, adhered to by the communication parties in order to ensure achieving various security or privacy
More informationSecurity Provider Integration SAML Single Sign-On
Security Provider Integration SAML Single Sign-On 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationefolder White Paper: HIPAA Compliance
efolder White Paper: HIPAA Compliance November 2015 Copyright 2015, efolder, Inc. Abstract This paper outlines how companies can use certain efolder services to facilitate HIPAA and HITECH compliance within
More informationCertification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure
Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages
More informationStartup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):
Privacy Policy Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): visit any websites or mobile sites offered by Startup
More informationSYDNEY FESTIVAL PRIVACY POLICY
1. Level 5, 10 Hickson Road The Rocks Sydney NSW 2000 Australia Phone 61 2 8248 6500 Fax 61 2 8248 6599 sydneyfestival.org.au ABN 60 070 285 344 SYDNEY FESTIVAL PRIVACY POLICY Our Commitment to your Privacy
More informationSecurity Provider Integration: SAML Single Sign-On
Security Provider Integration: SAML Single Sign-On 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationTAS 3 Architecture. Sampo Kellomäki Symlabs , ServiceWave, Stockholm
TAS 3 Architecture Sampo Kellomäki (sampo@symlabs.com), Symlabs 23.11.2009, ServiceWave, Stockholm The research leading to these results has received funding from the European Community s Seventh Framework
More informationWhois Study Table Updated 18 February 2009
Whois Study Table Updated 18 February 2009 This table is based on the chart included in the WHOIS Hypothesis Report of 26 August 2008, amended to show related or overlapping studies clustered into letter
More informationPolicy & Procedure Privacy Policy
NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants
More information"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.
Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and
More information