17 research outputs found
Electronic Identity in Europe: Legal challenges and future perspectives (e-ID 2020)
This deliverable presents the work developed by the IPTS eID Team in 2012 on the large-encompassing topic of electronic identity. It is structured in four different parts: 1) eID: Relevance, Le-gal State-of-the-Art and Future Perspectives; 2) Digital Natives and the Analysis of the Emerging Be-havioral Trends Regarding Privacy, Identity and Their Legal Implications; 3) The "prospective" use of social networking services for government eID in Europe; and 4) Facial Recognition, Privacy and Iden-tity in Online Social Networks.JRC.J.3-Information Societ
Strong Electronic Identification: Survey & Scenario Planning
The deployment of more high-risk services such as online banking and government services on the Internet has meant that the need and demand for strong electronic identity is bigger today more than ever. Different stakeholders have different reasons for moving their services to the Internet, including cost savings, being closer to the customer or citizen, increasing volume and value of services among others.
This means that traditional online identification schemes based on self-asserted identities are no longer sufficient to cope with the required level of assurance demanded by these services. Therefore, strong electronic identification methods that utilize identifiers rooted in real world identities must be provided to be used by customers and citizens alike on the Internet.
This thesis focuses on studying state-of-the-art methods for providing reliable and mass market strong electronic identity in the world today. It looks at concrete real-world examples that enable real world identities to be transferred and used in the virtual world of the Internet.
The thesis identifies crucial factors that determine what constitutes a strong electronic identity solution and through these factors evaluates and compares the example solutions surveyed in the thesis.
As the Internet become more pervasive in our lives; mobile devices are becoming the primary devices for communication and accessing Internet services. This has thus, raised the question of what sort of strong electronic identity solutions could be implemented and how such solutions could adapt to the future.
To help to understand the possible alternate futures, a scenario planning and analysis method was used to develop a series of scenarios from underlying key economic, political, technological and social trends and uncertainties. The resulting three future scenarios indicate how the future of strong electronic identity will shape up with the aim of helping stakeholders contemplate the future and develop policies and strategies to better position themselves for the future
Strong Electronic Identification: Survey & Scenario Planning
The deployment of more high-risk services such as online banking and government services on the Internet has meant that the need and demand for strong electronic identity is bigger today more than ever. Different stakeholders have different reasons for moving their services to the Internet, including cost savings, being closer to the customer or citizen, increasing volume and value of services among others.
This means that traditional online identification schemes based on self-asserted identities are no longer sufficient to cope with the required level of assurance demanded by these services. Therefore, strong electronic identification methods that utilize identifiers rooted in real world identities must be provided to be used by customers and citizens alike on the Internet.
This thesis focuses on studying state-of-the-art methods for providing reliable and mass market strong electronic identity in the world today. It looks at concrete real-world examples that enable real world identities to be transferred and used in the virtual world of the Internet.
The thesis identifies crucial factors that determine what constitutes a strong electronic identity solution and through these factors evaluates and compares the example solutions surveyed in the thesis.
As the Internet become more pervasive in our lives; mobile devices are becoming the primary devices for communication and accessing Internet services. This has thus, raised the question of what sort of strong electronic identity solutions could be implemented and how such solutions could adapt to the future.
To help to understand the possible alternate futures, a scenario planning and analysis method was used to develop a series of scenarios from underlying key economic, political, technological and social trends and uncertainties. The resulting three future scenarios indicate how the future of strong electronic identity will shape up with the aim of helping stakeholders contemplate the future and develop policies and strategies to better position themselves for the future
Data Spaces
This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical
Data Spaces
This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical
Challenges in Cybersecurity and Privacy - the European Research Landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
Challenges in Cybersecurity and Privacy - the European Research Landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
Identity in eHealth - from the reality of physical identification to digital identification.
Mestrado em Informática MédicaMaster Programme in Medical Informatic
Privacidade em redes de próxima geração
Doutoramento em Engenharia InformáticaIn the modern society, communications and digital transactions are becoming
the norm rather than the exception. As we allow networked computing devices
into our every-day actions, we build a digital lifestyle where networks and
devices enrich our interactions. However, as we move our information towards
a connected digital environment, privacy becomes extremely important as most
of our personal information can be found in the network. This is especially
relevant as we design and adopt next generation networks that provide
ubiquitous access to services and content, increasing the impact and pervasiveness
of existing networks.
The environments that provide widespread connectivity and services usually
rely on network protocols that have few privacy considerations, compromising
user privacy. The presented work focuses on the network aspects of privacy,
considering how network protocols threaten user privacy, especially on next
generation networks scenarios. We target the identifiers that are present in
each network protocol and support its designed function. By studying how the
network identifiers can compromise user privacy, we explore how these threats
can stem from the identifier itself and from relationships established between
several protocol identifiers.
Following the study focused on identifiers, we show that privacy in the network
can be explored along two dimensions: a vertical dimension that establishes
privacy relationships across several layers and protocols, reaching the user,
and a horizontal dimension that highlights the threats exposed by individual
protocols, usually confined to a single layer. With these concepts, we outline an
integrated perspective on privacy in the network, embracing both vertical and
horizontal interactions of privacy. This approach enables the discussion of several
mechanisms to address privacy threats on individual layers, leading to
architectural instantiations focused on user privacy. We also show how the
different dimensions of privacy can provide insight into the relationships that
exist in a layered network stack, providing a potential path towards designing
and implementing future privacy-aware network architectures.Na sociedade moderna, as comunicações e transacções digitais estão a
tornar-se a regra e não a excepção. À medida que permitimos a intromissão de
dispositivos electrónicos de rede no nosso quotidiano, vamos construÃndo um
estilo de vida digital onde redes e dispositivos enrirquecem as nossas interacções.
Contudo, ao caminharmos para um ambiente digital em rede, a nossa
privacidade vai-se revestindo de maior importãncia, pois a nossa informação
pessoal passa a encontrar-se cada vez mais na rede. Isto torna-se particularmente
relevante ao adoptarmos redes de próxima geração, que permitem
acesso ubÃquo a redes, serviços e conteúdos, aumentando o impacte e
pervasividade das redes actuais.
Os ambientes onde a conectividade e os serviços se tornam uma constante,
assentam em protocolos de rede que normalmente contemplam poucas
considerações sobre privacidade, comprometendo desta forma o utlizador. O
presente trabalho centra-se nos aspectos de privacidade que dizem respeito Ã
rede devido à forma como os protocolos são utilizados nas diferentes camadas,
e que resultando em ameaças à privacidade do utilizador. Abordamos especificamente
os identificadores presentes nos protocolos de rede, e que são
essenciais à sua função. Neste contexto exploramos a possibilidade destes
identificadores comprometerem a privacidade do utilizador através da
informação neles contida, bem como das relações que podem ser estabelecidas
entre identificadores de diferentes protocolos.
Após este estudo centrado nos identificadores, mostramos como a privacidade
em redes pode ser explorada ao longo de duas dimensões: uma dimensão que
acentua as relações verticais de privacidade, cruzando vários protocolos até
chegar ao utilizador, e uma dimensão horizontal que destaca as ameaças
causadas por cada protocolo, de forma individual, normalmente limitadas a
uma única camada. Através destes conceitos, mostramos uma visão integrada
de privacidade em redes, abrangendo tanto as interacçoes de privacidade
verticais como as horizontais. Esta visão permite discutir vários mecanismos
para mitigar ameaças especÃficas a cada camada de rede, resultando em
instânciações arquitecturais orientadas à privacidade do utilizador. Finalmente,
mostramos como as diferentes dimensões de privacidade podem fornecer uma
visão diferente sobre as relações estabelecidas na pilha protocolar que
assenta em camadas, mostrando um caminho possÃvel para o desenvolvimento
de futuras arquitecturas de rede com suporte para privacidade