Privacy Technologies
Facebook Twitter LinkedIn

Privacy Technologies

Roundtable
Thursday, April 19, 2012 10:30—12:30
Location: Ammersee 2

Anonymous Credentials in Practice

Anonymous credentials allow users to reveal certain properties (like their age, nationality, subscriptions) about themselves, without revealing their full name. Such credentials have obvious privacy advantages. For increased security and improved user experience, such credentials are ideally implemented on a smart card. Until recently, however, the complex cryptography involved has made this impossible. In this talk I will discuss recent results that show that efficient implementations of anonymous credentials on smart cards are now becoming possible, and I will discuss how this will stimulate the practical application of such credentials in several application domains, like e-government, e-health and the like.

Prof. Dr. Jaap-Henk Hoepman
Prof. Dr. Jaap-Henk Hoepman
Radboud University Nijmegen
Jaap-Henk Hoepman is senior scientist computer security, privacy and identity management at TNO, the Dutch Organisation for Applied Scientific Research. He also holds an associate professor...

What ABC4Trust can do for Privacy in eID

The need for privacy-respecting use of unique identifiers in emerging European eID cards has been underlined by many. The emerging privacy-ABCs (Attribute-based Credentials) technologies have significant potential in this area. One of the goals of the European Project ABC4Trust is to provide a common unified architecture for privacy-ABCs that is independent of the specific technologies existing today (e.g. Idemix, U-Prove) and support the federation and interoperability between them. In this talk I will highlight the most relevant issues of the ABC4Trust architecture and how the project implements it and deploys it in actual production pilots.

Dr. Ioannis Krontiris
Dr. Ioannis Krontiris
Goethe University Frankfurt
Dr. Ioannis Krontiris is a senior researcher in the Deutsche Telekom Chair of Mobile Business & Multilateral Security at Goethe University Frankfurt, Germany. He holds a PhD in computer science...

Privacy Protection: Architecture does not compromise, but application often will - what can be done?

The presentation will highlight that TAS3 as an architecture, with pair-wise pseudonymous design throughout, will not mandate as a technical requirement for operation any privacy compromise.

However, we are fully aware that users may supply voluntarily to applications (sometimes the apps even have need to know) privacy compromising information. This motivates the legal/audit/accountability (trustworthiness) aspect of TAS3. Given that PII is going to be given to apps by users, there has to be a credible framework in place to ensure it is handled responsibly and Service Providers are held accountable for handling it so.


STORK: Technical Solution and Data Protection Considerations

The STORK Large Scale Pilot brought eighteen EU and EEA Member States together to implement an interoperability solution on top of their national eID initiatives. The solution has been tested between in 2010 and 2011 in six cross-border pilots. The presentation will describe the technical solution and will discuss lessons learned from its deployment in production systems. Particular attention will be given to privacy aspects. The presentation will describe what privacy measures have been implemented by STORK and will summarize the recommendations that the Article 29 Data Protection Working Party has given on that.

STORK: Technical Solution and Data Protection Considerations
Presentation deck
STORK: Technical Solution and Data Protection Considerations
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Herbert Leitold
Herbert Leitold
A-SIT, Graz University of Technology
Herbert Leitold received his masters in telecommunication and informatics in 1996. From 1990 to 1994 he worked as a test technician at austriamicrosystems. Herbert has been research assistant at...

eID Management in Australasia - What are the Paths taken und what may the Future hold?

SAML, the OASIS WS* and PKI are all familiar tools for privacy (and security) respecting eID Management. This short presentation will trace the technology paths taken in varous initiatives in Australasia, and what the future may hold

Colin Wallis
Colin Wallis
Internal Affairs Dept, New Zealand Government
Colin holds leadership positions across the consortium space in Information Security and Trusted Identity - particularly where policy, strategy and technology plays into cloud, big data, government...

Minimal Disclosure: Achieving lift-off

Ronny Bjones
Ronny Bjones
Microsoft
Ronny Bjones currently is working for Microsoft Corporate as senior architect in the identity & security division. Ronny joined Microsoft in 2002 to contribute in trustworthy computing. Later...
Kim Cameron
Kim Cameron
Microsoft
Kim is Architect of Identity in the Identity Division at Microsoft, where he champions the emergence of a privacy-enhancing Identity Metasystem reaching across technologies,...
Subscribe for updates
Please provide your email address