PrivacyPrivacy in Businessin Business ProcessesProcesses byby
IdentityIdentity ManagementManagement
IST 2006, Helsinki, November 23IST 2006, Helsinki, November 23rdrd, 2006, 2006
Sven Wohlgemuth
Prof. Dr. Günter Müller
Albert-Ludwig University of Freiburg, Germany
Institute of Computer Science and Social Studies
Department of Telematics
http://www.telematik.uni-freiburg.de
http://www.telematik.uni-freiburg.de 2Sven Wohlgemuth <wohlgemuth@iig.uni-freiburg.de>
IIG Telematics
Prof. Dr. Günter Müller
Computer science
(7 assistants)
Privacy &
security E-Commerce Economics
(7 assistants)
• iManager: Security and usability by identity management (CeBIT 2003, doIT Software-Award
2003)
• Int. Conference on Emerging Trends in Information and Communication Security (ETRICS)
2006
• Editor of CACM special issue “Privacy and Security in Highly Dynamic Systems”, Sept. 2006
• Electronic Commerce Enquête 2005: Use of IT in German enterprises
• Coordination of German Priority Programme “Security in the Information and Communication
Technology”
• Coordination of FIDIS NoE work package “Privacy in Business Processes”
http://www.telematik.uni-freiburg.de 3Sven Wohlgemuth <wohlgemuth@iig.uni-freiburg.de>
43,6%
37,3% 34,4% 34,2%
22,6% 20,9%
44,3%
46,8% 49,8% 47,7%
56,7% 58,4%
12,0%
16,0% 15,8% 18,1% 20,7% 20,7%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
no
medium
high
Costly integration
in processes
Expected neg.
reaction since
privacy
violation
Doubts wrt.
data
protection
laws
Low customer
acceptance
Other legal
doubts
Pot. loss
of reputation
http://www.telematik.uni-freiburg.de/ece.php
SurveySurvey forfor Germany (ECE IV)Germany (ECE IV)
MostMost ImportantImportant BarriersBarriers forfor PersonalizedPersonalized ServicesServices
http://www.telematik.uni-freiburg.de 4Sven Wohlgemuth <wohlgemuth@iig.uni-freiburg.de>
I want a car
Car
Service 1
Service 2
Challenge: User-controlled disclosure of personal data
I need money
Money
Profile 1
Profile 2
Jendricke, U., Gerd tom Markotten, D.: Usability meets Security - The Identity-Manager as your Personal Security Assistant for the Internet, ACSAC, 2000
Problem 1: Linkability ofProblem 1: Linkability of ProfilesProfiles
Personalised services:
Conscious data collection
Creating profiles
Tracing an user by
identifying data
U
=
profile
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Identity management (e.g. Freiburg iManager)
http://www.telematik.uni-freiburg.de 5Sven Wohlgemuth <wohlgemuth@iig.uni-freiburg.de>
Wohlgemuth, S., Müller, G.: Privacy with Delegation of Rights by Identity Management, LNCS 3995, 2006
Need medical
help
Therapy
Service 1
Blood analysis of P
Result
Service 2 …
Person
Person
Profile 2
Profile
1+2+…
Big Brother
Loss of control• All-or-nothing delegation
• DREISAM: Protocol for unlinkable delegation of rights on personal data
Problem 2: Delegation ofProblem 2: Delegation of ProfilesProfiles
Challenge: User-controlled disclosure and use of personal data
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
Driving
licence
Stella Freiburger
Classes: ABE
Friedrichstr. 50
D-79098 Freiburg
Germany
IP: 132.15.16.3
http://www.telematik.uni-freiburg.de 6Sven Wohlgemuth <wohlgemuth@iig.uni-freiburg.de>
Service 1
Profile 1
RFID
data
Sensor
data
Policy
data
Video
data
AmI changes collection:
Conscious communication
Unaware
human-machine
communication
User has no control on disclosure
of personal data
…
Sackmann, S., Strüker, J., Accorsi, R.: Personalization in Privacy-Aware Highly Dynamic Systems, CACM 49(9), 2006
Challenge: Avoidance of loss of control on personal data
Problem 3: Unaware Collection of ProfilesProblem 3: Unaware Collection of Profiles
http://www.telematik.uni-freiburg.de 7Sven Wohlgemuth <wohlgemuth@iig.uni-freiburg.de>
OurOur Approach:Approach: PrivacyPrivacy EvidenceEvidence
Accorsi, R.: On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems, IFIP/SEC 2006
http://www.telematik.uni-freiburg.de 8Sven Wohlgemuth <wohlgemuth@iig.uni-freiburg.de>
Contact me!
Sven Wohlgemuth
E-Mail wohlgemuth@iig.uni-freiburg.de
WWW http://www.telematik.uni-freiburg.de
LookingLooking forfor PartnersPartners
Challenge: Avoidance of loss of control on personal data
Privacy evidences
Flexible privacy policy
Usable secure
interfaces
Delegation
Secure logging & audit
Watch this space!

More Related Content

PDF
Durchsetzung von Privacy Policies in Dienstenetzen
PDF
Privacy-Enhancing Trust Infrastructure for Process Mining
PDF
EN 6.3: 3 Sicherheitsmodelle
PDF
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
PDF
Multiagent System Technologies 12th German Conference Mates 2014 Stuttgart Ge...
PDF
Solutions for Coping with Privacy and Usability
PDF
Infrastructure Security International Conference Infrasec 2002 Bristol Uk Oct...
PPTX
Security Made in Germany gateprotect
Durchsetzung von Privacy Policies in Dienstenetzen
Privacy-Enhancing Trust Infrastructure for Process Mining
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
Multiagent System Technologies 12th German Conference Mates 2014 Stuttgart Ge...
Solutions for Coping with Privacy and Usability
Infrastructure Security International Conference Infrasec 2002 Bristol Uk Oct...
Security Made in Germany gateprotect

Similar to Privacy in Business Processes by Identity Management (20)

PDF
Privacy in e-Health
PPTX
The BYOD Security Battleground
PPTX
WEBINAR_CNIL_Anonymisation&Pseudonymisation_FrenchTechCentral200529
PDF
Security And Privacy Trends In The Industrial Internet Of Things 1st Ed Crist...
PDF
Hardening as a Part of a holistic Security Strategy (UPDATE)
PDF
Isse 2006 Securing Electronic Busines Processes Highlights Of The Information...
PPTX
PDF
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
PDF
Ge healthcare eu integrating privacy&amp;security 2015 09-23
PDF
Trust Management IX 9th IFIP WG 11 11 International Conference IFIPTM 2015 Ha...
PPTX
License-based Access Control in EPCglobal Networks
PPTX
Demystifying Industrial Security
PDF
Privacy by Design
PDF
Security Metrics Management Gerald L. Kovacich
PPTX
Ghassan farra it security a cio perspective
PDF
Secure Multiparty Ecommerce Protocols Ctlin V Brjoveanu
PPTX
Medtec - Cyber-security Challenges on the Horizon
PDF
Swisscom social media en français
PDF
Trust Management IX 9th IFIP WG 11 11 International Conference IFIPTM 2015 Ha...
PPT
BSI British Standards Information Governance Workshop Presentation
Privacy in e-Health
The BYOD Security Battleground
WEBINAR_CNIL_Anonymisation&Pseudonymisation_FrenchTechCentral200529
Security And Privacy Trends In The Industrial Internet Of Things 1st Ed Crist...
Hardening as a Part of a holistic Security Strategy (UPDATE)
Isse 2006 Securing Electronic Busines Processes Highlights Of The Information...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Ge healthcare eu integrating privacy&amp;security 2015 09-23
Trust Management IX 9th IFIP WG 11 11 International Conference IFIPTM 2015 Ha...
License-based Access Control in EPCglobal Networks
Demystifying Industrial Security
Privacy by Design
Security Metrics Management Gerald L. Kovacich
Ghassan farra it security a cio perspective
Secure Multiparty Ecommerce Protocols Ctlin V Brjoveanu
Medtec - Cyber-security Challenges on the Horizon
Swisscom social media en français
Trust Management IX 9th IFIP WG 11 11 International Conference IFIPTM 2015 Ha...
BSI British Standards Information Governance Workshop Presentation
Ad

More from Sven Wohlgemuth (20)

PDF
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
PDF
Competitive Compliance with Blockchain
PDF
Secure Sharing of Design Information with Blockchains
PDF
個人情報の有効活用を可能にする (Enabling effective use of personal information)
PDF
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
PDF
EN 6.3: 4 Kryptographie
PDF
Privacy in Business Processes by User-Centric Identity Management
PDF
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
PDF
On Privacy in Medical Services with Electronic Health Records
PDF
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
PDF
Privacy with Secondary Use of Personal Information
PDF
International Workshop on Information Systems for Social Innovation (ISSI) 2009
PDF
Privacy in Business Processes by User-Centric Identity Management
PDF
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
PDF
Resilience by Usable Security
PDF
Sicherheit in einer vernetzten Welt
PDF
iManager - nutzer-zentrierter Identitätsmanager
PDF
ATUS - A Toolkit for Usable Security
PDF
PersoApp - Secure and User-Friendly Internet Applications
PDF
PersoApp - An Open Source Community for the new German national ID card
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
Competitive Compliance with Blockchain
Secure Sharing of Design Information with Blockchains
個人情報の有効活用を可能にする (Enabling effective use of personal information)
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
EN 6.3: 4 Kryptographie
Privacy in Business Processes by User-Centric Identity Management
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
On Privacy in Medical Services with Electronic Health Records
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
Privacy with Secondary Use of Personal Information
International Workshop on Information Systems for Social Innovation (ISSI) 2009
Privacy in Business Processes by User-Centric Identity Management
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Resilience by Usable Security
Sicherheit in einer vernetzten Welt
iManager - nutzer-zentrierter Identitätsmanager
ATUS - A Toolkit for Usable Security
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - An Open Source Community for the new German national ID card
Ad

Recently uploaded (20)

PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PPTX
Artificial_Intelligence_Basics use in our daily life
PPTX
using the citation of Research to create a research
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PDF
Computer Networking, Internet, Casting in Network
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
IT-Human Computer Interaction Report.pptx
PPTX
Basic_of_Computer_System.pptx class-8 com
PDF
JuanConnect E-Wallet Guide for new users.pdf
PDF
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
PPTX
Networking2-LECTURE2 this is our lessons
PDF
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
PPTX
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PDF
How Technology Shapes Our Information Age
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
PDF
Course Overview and Agenda cloud security
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Artificial_Intelligence_Basics use in our daily life
using the citation of Research to create a research
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Computer Networking, Internet, Casting in Network
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
IT-Human Computer Interaction Report.pptx
Basic_of_Computer_System.pptx class-8 com
JuanConnect E-Wallet Guide for new users.pdf
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
Networking2-LECTURE2 this is our lessons
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
How Technology Shapes Our Information Age
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
Course Overview and Agenda cloud security
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx

Privacy in Business Processes by Identity Management

  • 1. PrivacyPrivacy in Businessin Business ProcessesProcesses byby IdentityIdentity ManagementManagement IST 2006, Helsinki, November 23IST 2006, Helsinki, November 23rdrd, 2006, 2006 Sven Wohlgemuth Prof. Dr. Günter Müller Albert-Ludwig University of Freiburg, Germany Institute of Computer Science and Social Studies Department of Telematics http://www.telematik.uni-freiburg.de
  • 2. http://www.telematik.uni-freiburg.de 2Sven Wohlgemuth <[email protected]> IIG Telematics Prof. Dr. Günter Müller Computer science (7 assistants) Privacy & security E-Commerce Economics (7 assistants) • iManager: Security and usability by identity management (CeBIT 2003, doIT Software-Award 2003) • Int. Conference on Emerging Trends in Information and Communication Security (ETRICS) 2006 • Editor of CACM special issue “Privacy and Security in Highly Dynamic Systems”, Sept. 2006 • Electronic Commerce Enquête 2005: Use of IT in German enterprises • Coordination of German Priority Programme “Security in the Information and Communication Technology” • Coordination of FIDIS NoE work package “Privacy in Business Processes”
  • 3. http://www.telematik.uni-freiburg.de 3Sven Wohlgemuth <[email protected]> 43,6% 37,3% 34,4% 34,2% 22,6% 20,9% 44,3% 46,8% 49,8% 47,7% 56,7% 58,4% 12,0% 16,0% 15,8% 18,1% 20,7% 20,7% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% no medium high Costly integration in processes Expected neg. reaction since privacy violation Doubts wrt. data protection laws Low customer acceptance Other legal doubts Pot. loss of reputation http://www.telematik.uni-freiburg.de/ece.php SurveySurvey forfor Germany (ECE IV)Germany (ECE IV) MostMost ImportantImportant BarriersBarriers forfor PersonalizedPersonalized ServicesServices
  • 4. http://www.telematik.uni-freiburg.de 4Sven Wohlgemuth <[email protected]> I want a car Car Service 1 Service 2 Challenge: User-controlled disclosure of personal data I need money Money Profile 1 Profile 2 Jendricke, U., Gerd tom Markotten, D.: Usability meets Security - The Identity-Manager as your Personal Security Assistant for the Internet, ACSAC, 2000 Problem 1: Linkability ofProblem 1: Linkability of ProfilesProfiles Personalised services: Conscious data collection Creating profiles Tracing an user by identifying data U = profile Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Identity management (e.g. Freiburg iManager)
  • 5. http://www.telematik.uni-freiburg.de 5Sven Wohlgemuth <[email protected]> Wohlgemuth, S., Müller, G.: Privacy with Delegation of Rights by Identity Management, LNCS 3995, 2006 Need medical help Therapy Service 1 Blood analysis of P Result Service 2 … Person Person Profile 2 Profile 1+2+… Big Brother Loss of control• All-or-nothing delegation • DREISAM: Protocol for unlinkable delegation of rights on personal data Problem 2: Delegation ofProblem 2: Delegation of ProfilesProfiles Challenge: User-controlled disclosure and use of personal data Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3 Driving licence Stella Freiburger Classes: ABE Friedrichstr. 50 D-79098 Freiburg Germany IP: 132.15.16.3
  • 6. http://www.telematik.uni-freiburg.de 6Sven Wohlgemuth <[email protected]> Service 1 Profile 1 RFID data Sensor data Policy data Video data AmI changes collection: Conscious communication Unaware human-machine communication User has no control on disclosure of personal data … Sackmann, S., Strüker, J., Accorsi, R.: Personalization in Privacy-Aware Highly Dynamic Systems, CACM 49(9), 2006 Challenge: Avoidance of loss of control on personal data Problem 3: Unaware Collection of ProfilesProblem 3: Unaware Collection of Profiles
  • 7. http://www.telematik.uni-freiburg.de 7Sven Wohlgemuth <[email protected]> OurOur Approach:Approach: PrivacyPrivacy EvidenceEvidence Accorsi, R.: On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems, IFIP/SEC 2006
  • 8. http://www.telematik.uni-freiburg.de 8Sven Wohlgemuth <[email protected]> Contact me! Sven Wohlgemuth E-Mail [email protected] WWW http://www.telematik.uni-freiburg.de LookingLooking forfor PartnersPartners Challenge: Avoidance of loss of control on personal data Privacy evidences Flexible privacy policy Usable secure interfaces Delegation Secure logging & audit Watch this space!