Show simple item record

AuthorKargl, Frankdc.contributor.author
AuthorSchaub, Floriandc.contributor.author
AuthorDietzel, Stefandc.contributor.author
Date of accession2016-03-15T06:22:53Zdc.date.accessioned
Available in OPARU since2016-03-15T06:22:53Zdc.date.available
Year of creation2010dc.date.created
AbstractModern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such systems. We outline general principles for data protection and their legal basis and argue why pure legal protection is insufficient. Strong privacy-enhancing technologies need to be deployed in cITS to protect user data while it is generated and processed. As data minimization cannot always prevent the need for disclosing relevant personal information, we introduce the new concept of mandatory enforcement of privacy policies. This concept empowers users and data subjects to tightly couple their data with privacy policies and rely on the system to impose such policies onto any data processors. We also describe the PRECIOSA Privacy-enforcing Runtime Architecture that exemplifies our approach. Moreover, we show how an application can utilize this architecture by applying it to a pay as you drive (PAYD) car insurance scenario.dc.description.abstract
Languageendc.language.iso
PublisherUniversität Ulmdc.publisher
ID of original publ.http://www.aaai.org/Press/Reports/Symposia/Spring/ss-10-05.phpdc.relation.uri
LicenseStandard (Fassung vom 01.10.2008)dc.rights
Link to license texthttps://oparu.uni-ulm.de/xmlui/license_v2dc.rights.uri
KeywordITSdc.subject
KeywordPolicy enforcementdc.subject
Dewey Decimal GroupDDC 004 / Data processing & computer sciencedc.subject.ddc
LCSHPrivacydc.subject.lcsh
TitleMandatory enforcement of privacy policies using trusted computing principlesdc.title
Resource typeBeitrag zu einer Konferenzdc.type
DOIhttp://dx.doi.org/10.18725/OPARU-1726dc.identifier.doi
PPN1649508034dc.identifier.ppn
URNhttp://nbn-resolving.de/urn:nbn:de:bsz:289-vts-72787dc.identifier.urn
GNDDatenschutzdc.subject.gnd
GNDPrivatsphäredc.subject.gnd
GNDTrusted Computingdc.subject.gnd
FacultyFakultät für Ingenieurwissenschaften und Informatikuulm.affiliationGeneral
Citation of original publ.Privacy 2010 : Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA, March 2010uulm.citationOrigPub
Date of activation2010-06-02T15:10:08Zuulm.freischaltungVTS
Peer reviewjauulm.peerReview
DCMI TypeTextuulm.typeDCMI
VTS-ID7278uulm.vtsID
CategoryPublikationenuulm.category
Conference nameAAAI 2010 Spring Symposiumuulm.conferenceName
Conference placePalo Alto, CAuulm.conferencePlace
Conference start date2010-03-22uulm.conferenceStartDate
Conference end date2010-03-24uulm.conferenceEndDate
University Bibliographyjauulm.unibibliographie


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record