102 research outputs found

    Kapitel "Technische Grundlagen"

    Get PDF

    Lifelong privacy – privacy and identity management for life.

    Get PDF
    Abstract. The design of identity management preserving an individual's privacy must not stop at supporting the user in managing her/his present identities. Instead, since any kind of privacy intrusion may have implications on the individual's future life, it is necessary that we identify and understand the issues related to longterm aspects of privacyenhancing identity management. Only that way, according solutions can be developed, which enable users to control the disclosure of their personal data throughout their whole lives, comprising past, present, and future. This paper will give a general overview about concepts supporting privacyenhancing identity management. Further, it introduces the reader to the problem field of privacy management by means of privacy-enhancing identity management during various stages of life as well as in various areas of life. Statements about required mechanisms will be given as well as directions regarding the three most important aspects to consider when managing one's identities: communication infrastructure as well as selection of communication partners and tools

    05411 Abstracts Collection -- Anonymous Communication and its Applications

    Get PDF
    From 09.10.05 to 14.10.05, the Dagstuhl Seminar 05411 ``Anonymous Communication and its Applications\u27\u27 was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available

    Mixes in mobile communication systems: Location management with privacy

    Get PDF
    This paper introduces a new technique for location management in cellular networks. It avoids the recording of moving tracks of mobile subscribers. The described procedures are derived from the well known untraceable MIX network and the distributed storage of location information according to GSM networks

    Sicherheit im Netz -- Datensicherheit

    Get PDF

    Security in Public Mobile Communication Networks

    Get PDF
    Introduction The increasing use of mobile communication networks results in ever more stringent security requirements. In an information society, availability, integrity and confidentiality are essential. Especially the provision of the latter is hard to demonstrate. If someone or some component is able to collect and store personal data, one cannot be sure that this data is not gathered and not (mis)used. But this "being sure" is essential with respect to privacy and data protection. Therefore, legal means alone are insufficient and have to be complemented by technical means we are going to describe in the sequel. This first part is introductory and reflects the structure of future mobile communication networks. When users communicate in such networks there is much data generated which needs to be handled in a secure way. We present data protection and security requirements which we believe are the strongest ever presented. 1.1 Structure of Future Mobile Telecommun

    Datenschutz und Datensicherheit

    Get PDF
    • …
    corecore