Author | Kargl, Frank | dc.contributor.author |
Author | Schaub, Florian | dc.contributor.author |
Author | Dietzel, Stefan | dc.contributor.author |
Date of accession | 2016-03-15T06:22:53Z | dc.date.accessioned |
Available in OPARU since | 2016-03-15T06:22:53Z | dc.date.available |
Year of creation | 2010 | dc.date.created |
Abstract | Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such systems. We outline general principles for data protection and their legal basis and argue why pure legal protection is insufficient. Strong privacy-enhancing technologies need to be deployed in cITS to protect user data while it is generated and processed. As data minimization cannot always prevent the need for disclosing relevant personal information, we introduce the new concept of mandatory enforcement of privacy policies. This concept empowers users and data subjects to tightly couple their data with privacy policies and rely on the system to impose such policies onto any data processors. We also describe the PRECIOSA Privacy-enforcing Runtime Architecture that exemplifies our approach. Moreover, we show how an application can utilize this architecture by applying it to a pay as you drive (PAYD) car insurance scenario. | dc.description.abstract |
Language | en | dc.language.iso |
Publisher | Universität Ulm | dc.publisher |
ID of original publ. | http://www.aaai.org/Press/Reports/Symposia/Spring/ss-10-05.php | dc.relation.uri |
License | Standard (Fassung vom 01.10.2008) | dc.rights |
Link to license text | https://oparu.uni-ulm.de/xmlui/license_v2 | dc.rights.uri |
Keyword | ITS | dc.subject |
Keyword | Policy enforcement | dc.subject |
Dewey Decimal Group | DDC 004 / Data processing & computer science | dc.subject.ddc |
LCSH | Privacy | dc.subject.lcsh |
Title | Mandatory enforcement of privacy policies using trusted computing principles | dc.title |
Resource type | Beitrag zu einer Konferenz | dc.type |
DOI | http://dx.doi.org/10.18725/OPARU-1726 | dc.identifier.doi |
PPN | 1649508034 | dc.identifier.ppn |
URN | http://nbn-resolving.de/urn:nbn:de:bsz:289-vts-72787 | dc.identifier.urn |
GND | Datenschutz | dc.subject.gnd |
GND | Privatsphäre | dc.subject.gnd |
GND | Trusted Computing | dc.subject.gnd |
Faculty | Fakultät für Ingenieurwissenschaften und Informatik | uulm.affiliationGeneral |
Citation of original publ. | Privacy 2010 : Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA, March 2010 | uulm.citationOrigPub |
Date of activation | 2010-06-02T15:10:08Z | uulm.freischaltungVTS |
Peer review | ja | uulm.peerReview |
DCMI Type | Text | uulm.typeDCMI |
VTS ID | 7278 | uulm.vtsID |
Category | Publikationen | uulm.category |
Conference name | AAAI 2010 Spring Symposium | uulm.conferenceName |
Conference place | Palo Alto, CA | uulm.conferencePlace |
Conference start date | 2010-03-22 | uulm.conferenceStartDate |
Conference end date | 2010-03-24 | uulm.conferenceEndDate |
Bibliography | uulm | uulm.bibliographie |