首页 > 最新文献

2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity最新文献

英文 中文
Introducing New Technology into Italian Certified Electronic Mail: A Proposal 将新技术引入意大利认证电子邮件:一项建议
M. Buzzi, L. Ferrucci, F. Gennai, Claudio Petrucci
Over the last decade, an increasing number of Certified E-Mail systems (CEM) have been implemented in Europe and worldwide, but their diffusion and validity are mainly restricted in a national arena. Despite the effort of European Union (EU) that recently defined a specification for guaranteeing interoperability of CEM systems between Member States, its adoption has not be not yet fuelled, mainly since any CEM system receives a legal value by its State legislation. It is difficult to extend the legal value of CEM security mechanisms, e.g. Receipts with timestamps which are considered evidences and legal proofs in disputes that may arise from different Parties inside a State, unless a common political and legal agreement will be created. At this aim, recently EU introduce the new Regulation on Electronic Identification and Trust Services (eIDAS), to address this issue. We believe that the first step for encouraging a more large adoption between communities is to implement CEMs using standard worldwide recognized solutions. In this paper we propose a technical evolution of the Italian CEM, called Posta Elettronica Certificata (PEC) moving from a close mechanisms to the adoption of a more standardized, distributed solution, based on DNS Security Extensions (DNSSec). This proposal would have a minimal impact on the legislation, restricted to the annex that defines PEC technical rules.
在过去的十年中,越来越多的认证电子邮件系统(Certified E-Mail system, CEM)在欧洲和世界范围内得到了实现,但是它们的传播和有效性主要受到国家范围内的限制。尽管欧洲联盟(EU)最近努力制定了一项规范,以保证各成员国之间电磁监测系统的互操作性,但其采用尚未得到推动,主要是因为任何电磁监测系统都受到其国家立法的法律价值。除非建立共同的政治和法律协定,否则很难扩大CEM安全机制的法律价值,例如,在一个国家内不同缔约方可能产生的争端中,带有时间戳的收据被视为证据和法律证明。为此,欧盟最近推出了新的电子识别和信托服务条例(eIDAS),以解决这一问题。我们认为,鼓励社区之间更大规模采用CEMs的第一步是使用全球公认的标准解决方案来实现CEMs。在本文中,我们提出了意大利CEM的技术演变,称为Posta eleettronica Certificata (PEC),从一个封闭的机制转向采用一个更标准化的分布式解决方案,基于DNS安全扩展(DNSSec)。这项建议对立法的影响微乎其微,因为立法仅限于确定PEC技术规则的附件。
{"title":"Introducing New Technology into Italian Certified Electronic Mail: A Proposal","authors":"M. Buzzi, L. Ferrucci, F. Gennai, Claudio Petrucci","doi":"10.5555/2821464.2821474","DOIUrl":"https://doi.org/10.5555/2821464.2821474","url":null,"abstract":"Over the last decade, an increasing number of Certified E-Mail systems (CEM) have been implemented in Europe and worldwide, but their diffusion and validity are mainly restricted in a national arena. Despite the effort of European Union (EU) that recently defined a specification for guaranteeing interoperability of CEM systems between Member States, its adoption has not be not yet fuelled, mainly since any CEM system receives a legal value by its State legislation. It is difficult to extend the legal value of CEM security mechanisms, e.g. Receipts with timestamps which are considered evidences and legal proofs in disputes that may arise from different Parties inside a State, unless a common political and legal agreement will be created. At this aim, recently EU introduce the new Regulation on Electronic Identification and Trust Services (eIDAS), to address this issue. We believe that the first step for encouraging a more large adoption between communities is to implement CEMs using standard worldwide recognized solutions. In this paper we propose a technical evolution of the Italian CEM, called Posta Elettronica Certificata (PEC) moving from a close mechanisms to the adoption of a more standardized, distributed solution, based on DNS Security Extensions (DNSSec). This proposal would have a minimal impact on the legislation, restricted to the annex that defines PEC technical rules.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123852310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of Legal Interpretation in Business Process Compliance 法律解释对业务流程遵从性的影响
S. Ghanavati, J. Hulstijn
Regulations are often written as open norms. Thus, the development of systems that support compliance involves interpretation. Often, compliance officers consider several alternative solutions. Comparing the feasibility and deciding which alternative to select are important tasks. In this paper, we aim to show how analyzing the impact of several interpretation can be supported by requirements engineering tools, in particular, by Legal-URN. Two cases are used to illustrate the importance of interpretation and how Legal-URN facilitates it.
规章常常被写成公开的规范。因此,支持遵从性的系统的开发涉及到解释。通常,法规遵从人员会考虑几种替代解决方案。比较可行性并决定选择哪个替代方案是重要的任务。在本文中,我们的目标是展示需求工程工具,特别是Legal-URN,如何支持对几种解释的影响进行分析。两个案例被用来说明解释的重要性,以及Legal-URN如何促进解释。
{"title":"Impact of Legal Interpretation in Business Process Compliance","authors":"S. Ghanavati, J. Hulstijn","doi":"10.1109/TELERISE.2015.13","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.13","url":null,"abstract":"Regulations are often written as open norms. Thus, the development of systems that support compliance involves interpretation. Often, compliance officers consider several alternative solutions. Comparing the feasibility and deciding which alternative to select are important tasks. In this paper, we aim to show how analyzing the impact of several interpretation can be supported by requirements engineering tools, in particular, by Legal-URN. Two cases are used to illustrate the importance of interpretation and how Legal-URN facilitates it.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130978821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Privacy Points as a Method to Support Privacy Impact Assessments 隐私点作为一种支持隐私影响评估的方法
Julia Himmel, Nikolas Siebler, Felix Laegeler, Marco Grupe, Hanno Langweg
We introduce a lightweight and easy to use methodology to quantify relevant aspects of privacy based on the privacy points approach.
我们介绍了一种轻量级和易于使用的方法来量化基于隐私点方法的隐私的相关方面。
{"title":"Privacy Points as a Method to Support Privacy Impact Assessments","authors":"Julia Himmel, Nikolas Siebler, Felix Laegeler, Marco Grupe, Hanno Langweg","doi":"10.5555/2821464.2821478","DOIUrl":"https://doi.org/10.5555/2821464.2821478","url":null,"abstract":"We introduce a lightweight and easy to use methodology to quantify relevant aspects of privacy based on the privacy points approach.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment of Access Control Systems Using Mutation Testing 使用突变测试的访问控制系统评估
Said Daoudagh, F. Lonetti, E. Marchetti
In modern pervasive applications, it is important to validate access control mechanisms that are usually defined by means of the standard XACML language. Mutation analysis has been applied on access control policies for measuring the adequacy of a test suite. In this paper, we present a testing framework aimed at applying mutation analysis at the level of the Java based policy evaluation engine. A set of Java based mutation operators is selected and applied to the code of the Policy Decision Point (PDP). A first experiment shows the effectiveness of the proposed framework in assessing the fault detection of XACML test suites and confirms the efficacy of the application of code-based mutation operators to the PDP.
在现代普及应用程序中,验证通常由标准XACML语言定义的访问控制机制非常重要。突变分析已应用于访问控制策略,以度量测试套件的充分性。在本文中,我们提出了一个测试框架,旨在在基于Java的策略评估引擎级别上应用突变分析。选择一组基于Java的突变操作符并将其应用于策略决策点(PDP)的代码。第一个实验证明了该框架在评估XACML测试套件的故障检测方面的有效性,并证实了将基于代码的突变算子应用于PDP的有效性。
{"title":"Assessment of Access Control Systems Using Mutation Testing","authors":"Said Daoudagh, F. Lonetti, E. Marchetti","doi":"10.1109/TELERISE.2015.10","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.10","url":null,"abstract":"In modern pervasive applications, it is important to validate access control mechanisms that are usually defined by means of the standard XACML language. Mutation analysis has been applied on access control policies for measuring the adequacy of a test suite. In this paper, we present a testing framework aimed at applying mutation analysis at the level of the Java based policy evaluation engine. A set of Java based mutation operators is selected and applied to the code of the Policy Decision Point (PDP). A first experiment shows the effectiveness of the proposed framework in assessing the fault detection of XACML test suites and confirms the efficacy of the application of code-based mutation operators to the PDP.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124463702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Guide to End-to-End Privacy Accountability 端到端隐私问责指南
Denis Butin, D. Métayer
Accountability is considered a tenet of privacy management, yet implementing it effectively is no easy task. It requires a systematic approach with an overarching impact on the design and operation of IT systems. This article, which results from a multidisciplinary project involving lawyers, industry players and computer scientists, presents guidelines for the implementation of consistent sets of accountability measures in organisations. It is based on a systematic analysis of the Draft General Data Protection Regulation. We follow a systematic approach covering the whole life cycle of personal data and considering the three levels of privacy proposed by Bennett, namely accountability of policy, accountability of procedures and accountability of practice.
问责制被认为是隐私管理的一个原则,然而有效地实现它并非易事。它需要一种系统的方法,对It系统的设计和操作具有全面的影响。这篇文章来自一个涉及律师、行业参与者和计算机科学家的多学科项目,提出了在组织中实施一致的问责措施的指导方针。它是基于对通用数据保护条例草案的系统分析。我们采用系统的方法,涵盖个人资料的整个生命周期,并考虑到Bennett提出的三个层面的隐私,即政策问责、程序问责和实践问责。
{"title":"A Guide to End-to-End Privacy Accountability","authors":"Denis Butin, D. Métayer","doi":"10.1109/TELERISE.2015.12","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.12","url":null,"abstract":"Accountability is considered a tenet of privacy management, yet implementing it effectively is no easy task. It requires a systematic approach with an overarching impact on the design and operation of IT systems. This article, which results from a multidisciplinary project involving lawyers, industry players and computer scientists, presents guidelines for the implementation of consistent sets of accountability measures in organisations. It is based on a systematic analysis of the Draft General Data Protection Regulation. We follow a systematic approach covering the whole life cycle of personal data and considering the three levels of privacy proposed by Bennett, namely accountability of policy, accountability of procedures and accountability of practice.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Common Length Name Representation: An Efficient Privacy-Preserving Scheme 公共长度名称表示:一种有效的隐私保护方案
Hanna Farah, Daniel Amyot, K. Emam
Privacy-preserving record linkage is a valuable tool in various domains including the healthcare sector. Patient information is usually available in parts at more than one health organization. Given its sensitive nature, and the laws that protect patient privacy, these organizations cannot simply identify their patients to one another in order to complete their medical records. Yet, complete medical records lead to more informed decisions by doctors, therefore resulting in a higher quality of care. There are many methods in the literature that attempt to represent the identity of an individual in a privacy-preserving way to allow privacy-preserving record linkage. However, most of these techniques are subject to frequency attacks. We present a novel scheme for representing the name of an individual in a privacy-preserving manner that guards against frequency attacks, allows for small typing mistakes, and is efficient when linking large datasets.
保护隐私的记录链接在包括医疗保健部门在内的各个领域都是一种有价值的工具。患者信息通常可以在多个卫生组织中获得。考虑到它的敏感性,以及保护患者隐私的法律,这些组织不能简单地相互识别他们的患者,以完成他们的医疗记录。然而,完整的医疗记录可以使医生做出更明智的决定,从而提高护理质量。文献中有许多方法试图以保护隐私的方式表示个人的身份,以允许保护隐私的记录链接。然而,这些技术中的大多数都受到频率攻击。我们提出了一种新颖的方案,以一种保护隐私的方式来表示个人的名字,这种方式可以防止频率攻击,允许小的输入错误,并且在链接大型数据集时是有效的。
{"title":"Common Length Name Representation: An Efficient Privacy-Preserving Scheme","authors":"Hanna Farah, Daniel Amyot, K. Emam","doi":"10.1109/TELERISE.2015.16","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.16","url":null,"abstract":"Privacy-preserving record linkage is a valuable tool in various domains including the healthcare sector. Patient information is usually available in parts at more than one health organization. Given its sensitive nature, and the laws that protect patient privacy, these organizations cannot simply identify their patients to one another in order to complete their medical records. Yet, complete medical records lead to more informed decisions by doctors, therefore resulting in a higher quality of care. There are many methods in the literature that attempt to represent the identity of an individual in a privacy-preserving way to allow privacy-preserving record linkage. However, most of these techniques are subject to frequency attacks. We present a novel scheme for representing the name of an individual in a privacy-preserving manner that guards against frequency attacks, allows for small typing mistakes, and is efficient when linking large datasets.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123873350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying Transitivity Threats in Social Networks 识别社交网络中的及物性威胁
Sorren Hanvey, Néstor Cataño
Transitivity threats refer to the unintended disclosure of information to unintended recipients as a consequence of an unrelated action. In the context of social networking sites, transitivity threats refer to potential privacy policy breaches that stem from the automated transmission of data/content due to user actions within the social network. For example, commenting on some content within the social network makes the commented content visible to the recipients of the comment, thereby breaching the privacy policy under which the original/commented content was shared. This paper presents a novel approach for modelling and comparing social network privacy policies to deal with transitivity threats. Our approach differs from existing approaches in its use of formal methods techniques to compare social network privacy policies. This work builds on a predicate calculus definition for social networking, modelling social network content, people, friendship relations, and privacy policies as access permissions to content. We have implemented our approach as a tool called Poporo. The tool extends on a previous version of the Poporo tool that checked a third party application's compliance with system invariants. We validate our approach by using Poporo on several examples.
传递性威胁是指由于不相关的行为而导致信息意外泄露给意外的接收者。在社交网站的背景下,传递性威胁是指由于用户在社交网络内的行为而导致的数据/内容的自动传输而导致的潜在隐私政策泄露。例如,在社交网络中评论某些内容,使得评论的内容对评论的接收者可见,从而违反了共享原始/评论内容的隐私政策。本文提出了一种新的方法来建模和比较社交网络隐私策略,以处理传递性威胁。我们的方法不同于现有的方法,它使用形式化方法技术来比较社交网络隐私政策。这项工作建立在社交网络的谓词演算定义之上,将社交网络内容、人员、友谊关系和隐私政策建模为内容的访问权限。我们已经将我们的方法作为一个叫做Poporo的工具来实现。该工具扩展了以前版本的Poporo工具,该工具检查第三方应用程序对系统不变量的遵从性。我们通过在几个示例上使用Poporo来验证我们的方法。
{"title":"Identifying Transitivity Threats in Social Networks","authors":"Sorren Hanvey, Néstor Cataño","doi":"10.1109/TELERISE.2015.11","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.11","url":null,"abstract":"Transitivity threats refer to the unintended disclosure of information to unintended recipients as a consequence of an unrelated action. In the context of social networking sites, transitivity threats refer to potential privacy policy breaches that stem from the automated transmission of data/content due to user actions within the social network. For example, commenting on some content within the social network makes the commented content visible to the recipients of the comment, thereby breaching the privacy policy under which the original/commented content was shared. This paper presents a novel approach for modelling and comparing social network privacy policies to deal with transitivity threats. Our approach differs from existing approaches in its use of formal methods techniques to compare social network privacy policies. This work builds on a predicate calculus definition for social networking, modelling social network content, people, friendship relations, and privacy policies as access permissions to content. We have implemented our approach as a tool called Poporo. The tool extends on a previous version of the Poporo tool that checked a third party application's compliance with system invariants. We validate our approach by using Poporo on several examples.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cloud-Based Radiological Portal for the Patients: IT Contributing to Position the Patient as the Central Axis of the 21st Century Healthcare Cycles 面向患者的基于云的放射门户:IT有助于将患者定位为21世纪医疗保健周期的中轴线
R. Sanz-Requena, Alejandro Mañas Garcia, José Luis Cabrera-Ayala, G. García-Martí
Information and communication technologies are rapidly changing the way data is managed in medicine. Patients are becoming proactive actors of their healthcare cycles and new technologies are setting the proper ground to achieve this goal. Patients need to have ubiquitous access to their medical records, especially when they have mobility needs, and cloud-based approaches are a promising solution. However, several issues arise regarding privacy and security of the data, considering legal requirements about sensitive personal data. In order to be compliant with these requirements, cloud applications need to be designed carefully, preventing by design any possible data breaches. This work proposes a design for a cloud-based radiological portal to allow patients access their medical images and reports from the cloud, ensuring that the data are only accessible when all the requirements of a specific contract are enforced. Requirements, architecture design, software components and validation methods are introduced.
信息和通信技术正在迅速改变医学数据管理的方式。患者正在成为其医疗周期的主动参与者,而新技术正在为实现这一目标奠定适当的基础。患者需要无处不在地访问他们的医疗记录,特别是当他们有移动需求时,基于云的方法是一个很有前途的解决方案。然而,考虑到有关敏感个人数据的法律要求,在数据的隐私和安全方面出现了几个问题。为了符合这些需求,需要仔细设计云应用程序,通过设计防止任何可能的数据泄露。这项工作提出了一种基于云的放射门户的设计,允许患者从云访问他们的医学图像和报告,确保只有在执行特定合同的所有要求时才能访问数据。介绍了需求、体系结构设计、软件组成和验证方法。
{"title":"A Cloud-Based Radiological Portal for the Patients: IT Contributing to Position the Patient as the Central Axis of the 21st Century Healthcare Cycles","authors":"R. Sanz-Requena, Alejandro Mañas Garcia, José Luis Cabrera-Ayala, G. García-Martí","doi":"10.1109/TELERISE.2015.18","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.18","url":null,"abstract":"Information and communication technologies are rapidly changing the way data is managed in medicine. Patients are becoming proactive actors of their healthcare cycles and new technologies are setting the proper ground to achieve this goal. Patients need to have ubiquitous access to their medical records, especially when they have mobility needs, and cloud-based approaches are a promising solution. However, several issues arise regarding privacy and security of the data, considering legal requirements about sensitive personal data. In order to be compliant with these requirements, cloud applications need to be designed carefully, preventing by design any possible data breaches. This work proposes a design for a cloud-based radiological portal to allow patients access their medical images and reports from the cloud, ensuring that the data are only accessible when all the requirements of a specific contract are enforced. Requirements, architecture design, software components and validation methods are introduced.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130279135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cryptography and Information Security in the Post-Snowden Era 后斯诺登时代的密码学与信息安全
B. Preneel
Summary form only given. In June 2013 Edward Snowden has transferred a set of sensitive documents to journalists, resulting in a continuous stream of revelations on mass surveillance by governments. In this talk we present an overview of these revelations, we also discuss their impact on our understanding of mass surveillance practices and the security of ICT systems. In particular, we discuss the known ways in which sophisticated attackers can bypass or undermine cryptography. We conclude by analyzing how these revelations affect future research in information security and privacy.
只提供摘要形式。2013年6月,爱德华·斯诺登(Edward Snowden)向记者转交了一系列敏感文件,导致有关政府大规模监控的消息不断曝光。在这次谈话中,我们提出了这些启示的概述,我们还讨论了它们对我们对大规模监视实践和信息通信技术系统安全的理解的影响。特别是,我们讨论了已知的复杂攻击者可以绕过或破坏加密的方法。最后,我们分析了这些启示如何影响信息安全和隐私的未来研究。
{"title":"Cryptography and Information Security in the Post-Snowden Era","authors":"B. Preneel","doi":"10.1109/TELERISE.2015.8","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.8","url":null,"abstract":"Summary form only given. In June 2013 Edward Snowden has transferred a set of sensitive documents to journalists, resulting in a continuous stream of revelations on mass surveillance by governments. In this talk we present an overview of these revelations, we also discuss their impact on our understanding of mass surveillance practices and the security of ICT systems. In particular, we discuss the known ways in which sophisticated attackers can bypass or undermine cryptography. We conclude by analyzing how these revelations affect future research in information security and privacy.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile PPL v2.0:云和移动上的统一数据访问和使用控制
Francesco Di Cerbo, Doliére Francis Somé, L. Gomez, S. Trabelsi
Cloud storage is one of the most popular categories of market services. It provides an easy means for consumers to store and share their data, also in mobility through convenient apps. However, such valuable functionality raises several security concerns. Among them, the risk of sensitive information disclosure or, for professional data, the risk of compliance violations. In this paper, we propose an access and usage control framework for seamless, uniform and secure data sharing across cloud and mobile which keeps data under the control of its owner, that expresses preferences according to privacy or security needs. To our knowledge, this is the first effort addressing simultaneously and consistently cloud and mobile platforms. Our proposal offers access and usage control of managed resources relying on the security policy languages XACML and PPL (extended to make use of cloud and mobile contextual information) and on specific engines (cloud, mobile) to enforce them. A use case is presented, to illustrate the framework in action.
云存储是最受欢迎的市场服务类别之一。它为消费者提供了一种简单的方式来存储和共享他们的数据,也可以通过方便的应用程序来移动。然而,这种有价值的功能引起了一些安全问题。其中,敏感信息泄露的风险,或者对于专业数据,合规违规的风险。在本文中,我们提出了一个访问和使用控制框架,用于跨云和移动的无缝、统一和安全的数据共享,该框架将数据置于其所有者的控制之下,并根据隐私或安全需求表达偏好。据我们所知,这是第一次同时和一致地解决云和移动平台。我们的建议提供了对托管资源的访问和使用控制,这依赖于安全策略语言XACML和PPL(扩展到使用云和移动上下文信息)以及特定引擎(云、移动)来执行它们。本文给出了一个用例来说明框架的运行情况。
{"title":"PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile","authors":"Francesco Di Cerbo, Doliére Francis Somé, L. Gomez, S. Trabelsi","doi":"10.1109/TELERISE.2015.9","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.9","url":null,"abstract":"Cloud storage is one of the most popular categories of market services. It provides an easy means for consumers to store and share their data, also in mobility through convenient apps. However, such valuable functionality raises several security concerns. Among them, the risk of sensitive information disclosure or, for professional data, the risk of compliance violations. In this paper, we propose an access and usage control framework for seamless, uniform and secure data sharing across cloud and mobile which keeps data under the control of its owner, that expresses preferences according to privacy or security needs. To our knowledge, this is the first effort addressing simultaneously and consistently cloud and mobile platforms. Our proposal offers access and usage control of managed resources relying on the security policy languages XACML and PPL (extended to make use of cloud and mobile contextual information) and on specific engines (cloud, mobile) to enforce them. A use case is presented, to illustrate the framework in action.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125842637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1