tailieunhanh - Computer Security: Chapter 2 - Introduction to Privacy in Computing (incl. technical and legal privacy controls)
Computer Security: Chapter 2 - Introduction to Privacy in Computing (incl. technical and legal privacy controls) Introduction, Recognition of the need for privacy, Threats to privacy, Privacy Controls, Selected Advanced Topics in Privacy. | 2. Introduction to Privacy in Computing (incl. technical and legal privacy controls) Prof. Bharat Bhargava Center for Education and Research in Information Assurance and Security (CERIAS) and Department of Computer Sciences Purdue University bb@ Collaborators in the RAID Lab (): Dr. Leszek Lilien (Western Michigan University) Ms. Yuhui Zhong (former . Student) Outline — Introduction to Privacy in Computing 1) Introduction (def., dimensions, basic principles, ) 2) Recognition of the need for privacy 3) Threats to privacy 4) Privacy Controls ) Technical privacy controls - Privacy-Enhancing Technologies (PETs) a) Protecting user identities b) Protecting usee identities c) Protecting confidentiality & integrity of personal data ) Legal privacy controls Legal World Views on Privacy International Privacy Laws: Comprehensive or Sectoral Privacy Law Conflict between European Union – USA A Common Approach: Privacy Impact Assessments (PIA) Observations & Conclusions 5) Selected Advanced Topics in Privacy ) Privacy in pervasive computing ) Using trust paradigm for privacy protection ) Privacy metrics ) Trading privacy for trust 1. Introduction (1) [cf. Simone Fischer-Hübner] Def. of privacy [Alan Westin, Columbia University, 1967] = the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others 3 dimensions of privacy: 1) Personal privacy Protecting a person against undue interference (such as physical searches) and information that violates his/her moral sense 2) Territorial privacy Protecting a physical area surrounding a person that may not be violated without the acquiescence of the person Safeguards: laws referring to trespassers search warrants 3) Informational privacy Deals with the gathering, compilation and selective dissemination of information 1. Introduction (2) | 2. Introduction to Privacy in Computing (incl. technical and legal privacy controls) Prof. Bharat Bhargava Center for Education and Research in Information Assurance and Security (CERIAS) and Department of Computer Sciences Purdue University bb@ Collaborators in the RAID Lab (): Dr. Leszek Lilien (Western Michigan University) Ms. Yuhui Zhong (former . Student) Outline — Introduction to Privacy in Computing 1) Introduction (def., dimensions, basic principles, ) 2) Recognition of the need for privacy 3) Threats to privacy 4) Privacy Controls ) Technical privacy controls - Privacy-Enhancing Technologies (PETs) a) Protecting user identities b) Protecting usee identities c) Protecting confidentiality & integrity of personal data ) Legal privacy controls Legal World Views on Privacy International Privacy Laws: Comprehensive or Sectoral Privacy Law Conflict between European Union – USA A Common .
đang nạp các trang xem trước