publication . Master thesis . 2012

Privacy-Preserving Transparency-Enhancing Tools

Pulls, Tobias;
Open Access English
  • Published: 01 Jan 2012
  • Publisher: Karlstads universitet, Avdelningen för datavetenskap
  • Country: Sweden
Abstract
Transparency is a key principle in democratic societies. For example, the public sector is in part kept honest and fair with the help of transparency through different freedom of information (FOI) legislations. In the last decades, while FOI legislations have been adopted by more and more countries worldwide, we have entered the information age enabled by the rapid development of information technology. This has led to the need for technological solutions that enhance transparency, for example to ensure that FOI legislation can be adhered to in the digital world. These solutions are called transparency-enhancing tools (TETs), and consist of both technological an...
Subjects
free text keywords: Computer Sciences, Datavetenskap (datalogi)
Related Organizations
Funded by
EC| PRIMELIFE
Project
PRIMELIFE
Privacy and Identity Management in Europe for Life
  • Funder: European Commission (EC)
  • Project Code: 216483
  • Funding stream: FP7 | SP1 | ICT
19 references, page 1 of 2

[1] Rafael Accorsi. Automated privacy audits to complement the notion of control for identity management. In Elisabeth de Leeuw, Simone Fischer-Hübner, Jimmy Tseng, and John Borking, editors, Policies and Research in Identity Management, volume 261 of IFIP International Federation for Information Processing. Springer-Verlag, 2008. [OpenAIRE]

[2] Rafael Accorsi. Bbox: A distributed secure log architecture. In Jan Camenisch and Costas Lambrinoudakis, editors, EuroPKI, volume 6711 of Lecture Notes in Computer Science, pages 109-124. Springer, 2010.

[3] Alessandro Acquisti and Ralph Gross. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In George Danezis and Philippe Golle, editors, Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, pages 36-58. Springer, 2006.

[4] Christer Andersson, Jan Camenisch, Stephen Crane, Simone FischerHübner, Ronald Leenes, Siani Pearsorr, John Sören Pettersson, and Dieter Sommer. Trust in PRIME. In Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on, pages 552 -559, December 2005.

[11] Jan Camenisch, Ronald Leenes, and Dieter Sommer, editors. PRIME - Privacy and Identity Management for Europe, volume 6545 of Lecture Notes in Computer Science. Springer Berlin, 2011.

[12] Ann Cavoukian. Privacy by design. Information & Privacy Commissioner, Ontario, Canada, http://www.ipc.on.ca/images/ Resources/privacybydesign.pdf, accessed 2012-07-07.

[13] Scott A. Crosby and Dan S. Wallach. Efficient data structures for tamper-evident logging. In USENIX Security Symposium, pages 317-334. USENIX Association, 2009.

[14] Scott Alexander Crosby. Efficient tamper-evident data structures for untrusted servers. PhD thesis, Rice University, Houston, TX, USA, 2010.

[15] Leucio Antonio Cutillo, Refik Molva, and Melek Önen. Safebook: A distributed privacy preserving online social network. In 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM), pages 1-3. IEEE, 2011.

[16] Roger Dingledine, Nick Mathewson, and Paul F. Syverson. Tor: The second-generation onion router. In USENIX Security Symposium, pages 303-320. USENIX, 2004. [OpenAIRE]

[24] Hans Hedbom, Tobias Pulls, Peter Hjärtquist, and Andreas Lavén. Adding secure transparency logging to the PRIME Core. In Michele Bezzi, Penny Duquenoy, Simone Fischer-Hübner, Marit Hansen, and Ge Zhang, editors, Privacy and Identity Management for Life, volume 320 of IFIP Advances in Information and Communication Technology, pages 299-314. Springer Boston, 2010. 10.1007/978-3-642-14282-6_25.

[36] European Network of Excellence in Cryptology II. D.MAYA.3 - Main Computational Assumptions in Cryptography. April 2010.

[37] Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel. Website fingerprinting in onion routing based anonymization networks. In Yan Chen and Jaideep Vaidya, editors, WPES, pages 103-114. ACM, 2011.

[38] Martin Pirker, Daniel Slamanig, and Johannes Winter. Practical privacy preserving cloud resource-payment for constrained clients. In FischerHübner and Wright [19], pages 201-220.

[39] George Pólya. How to solve it: a new aspect of mathematical method. Science study series. Doubleday & Company, Inc, 1957.

19 references, page 1 of 2
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue