37 research outputs found

    Privacy Architectures: Reasoning About Data Minimisation and Integrity

    Get PDF
    Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task. We propose an approach based on the specification of privacy architectures and focus on a key aspect of privacy, data minimisation, and its tension with integrity requirements. We illustrate our formal framework through a smart metering case study.Comment: appears in STM - 10th International Workshop on Security and Trust Management 8743 (2014

    Peaks in the Hartle-Hawking Wave Function from Sums over Topologies

    Full text link
    Recent developments in ``Einstein Dehn filling'' allow the construction of infinitely many Einstein manifolds that have different topologies but are geometrically close to each other. Using these results, we show that for many spatial topologies, the Hartle-Hawking wave function for a spacetime with a negative cosmological constant develops sharp peaks at certain calculable geometries. The peaks we find are all centered on spatial metrics of constant negative curvature, suggesting a new mechanism for obtaining local homogeneity in quantum cosmology.Comment: 16 pages,LaTeX, no figures; v2: some changes coming from revision of a math reference: wave function peaks sharp but not infinite; v3: added paragraph in intro on interpretation of wave functio

    Trust Driven Strategies for Privacy by Design

    Get PDF
    Part 2: Full PapersInternational audienceIn this paper, we describe a multi-step approach to privacy by design. The main design step is the choice of the types of trust that can be accepted by the stakeholders, which is a key driver for the construction of an acceptable architecture. Architectures can be initially defined in a purely informal way and then mapped into a formal dedicated model. A tool integrating the approach can be used by designers to build and verify architectures. We apply the approach to a case study, an electronic toll pricing system, and show how different solutions can be suggested to the designer depending on different trust assumptions
    corecore