Is Privacy Supportive for Adaptive ICT Systems

作者: Sven Wohlgemuth

DOI: 10.1145/2684200.2684363

关键词:

摘要: Adaptive ICT systems promise to improve resilience by re-using and sharing services information related electronic identities real-time requirements of business networking applications. The aim is welfare security a society, e.g. "smart" city. Even though adaptive technically enable everyone participate both as service consumer provider without running the required technical infrastructure oneself, uncertain knowledge on enforcement legal, business, social impedes taking advantage systems. Not only IT risks confidentiality accountability are undecidable due lack control with current trust but also integrity availability transparency. Reasons insufficient quantification risk well unacceptable cause-and-effect relationships accountability. This work introduces identity management transparency for trustworthy spontaneous exchange critical activity

参考文章(59)
Kevin G Partridge, Lisa R Young, CERT® Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1 Defense Technical Information Center. ,(2011) , 10.1184/R1/6572195.V1
T. B. P. Hue, D. N. Thuc, T. B. D. Thuy, Isao Echizen, S. Wohlgemuth, A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service conference on e-business, e-services and e-society. pp. 25- 37 ,(2013) , 10.1007/978-3-642-37437-1_3
Alexander Grusho, Nick Grebnev, Elena Timonina, Covert channel invisibility theorem Communications in computer and information science. ,vol. 374, pp. 187- 196 ,(2007) , 10.1007/978-3-540-73986-9_16
Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy information security conference. pp. 241- 252 ,(2010) , 10.1007/978-3-642-15257-3_22
Marian Margraf, The New German ID Card ISSE 2010 Securing Electronic Business Processes. pp. 367- 373 ,(2011) , 10.1007/978-3-8348-9788-6_35
Volkmar Lotz, Emmanuel Pigout, Peter M. Fischer, Donald Kossmann, Fabio Massacci, Alexander Pretschner, Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach Wirtschaftsinformatik und Angewandte Informatik. ,vol. 50, pp. 383- 391 ,(2008) , 10.1007/S11576-008-0086-1
Sven Wohlgemuth, Adaptive User-Centered Security Advanced Information Systems Engineering. pp. 94- 109 ,(2014) , 10.1007/978-3-319-10975-6_7
Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson, Non-Interactive Key Exchange Public-Key Cryptography – PKC 2013. pp. 254- 271 ,(2013) , 10.1007/978-3-642-36362-7_17
Andreas Huther, Gesetz zur Kontrolle und Transparenz im Unternehmensbereich (KonTraG) Integriertes Chancen- und Risikomanagement. pp. 13- 27 ,(2003) , 10.1007/978-3-322-81583-5_2