2014 Twelfth Annual International Conference on Privacy, Security and Trust 2014
DOI: 10.1109/pst.2014.6890931
|View full text |Cite
|
Sign up to set email alerts
|

Enabling privacy through transparency

Abstract: Many access control systems, particularly those utilized in hospital environments, exercise optimistic security, because preventing access to information may have undesirable consequences. However, in the wrong hands, these over-broad permissions may result in privacy violations. To circumvent this issue, we have developed Privacy Enabling Transparent Systems (PETS) that makes transparency a key component in systems architectures. PETS is built on open web standards and introduces the Provenance Tracking Netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(29 citation statements)
references
References 17 publications
0
29
0
Order By: Relevance
“…Global Log + TTP Global Log + P2P Completeness ---Confidentiality MAC [2,7,14,15], FssAgg [10], PKI [7,10] MAC [1,6,11,12], PKI [20], unlinkability [6,11,12] MAC [15], PKI [16], compound identities [15,21] Correctness ---Immutability cipher chains [2], hash chains [7,15] hash chains [7,15] network of peers [16,19] blockchain [21] Integrity forward integrity [2,7,10,14,15] MAC security proof [2] forward integrity [1,6,11,12] forward integrity [15] Interoperability Performance: When it comes to the processing of the event data, various optimisations such as parallel processing and/or indexing should be used to improve processing efficiency. Scalability: Given the volume of events and policies that will need to be handled, the scalability of event data processing is a major consideration.…”
Section: Local Logmentioning
confidence: 99%
See 2 more Smart Citations
“…Global Log + TTP Global Log + P2P Completeness ---Confidentiality MAC [2,7,14,15], FssAgg [10], PKI [7,10] MAC [1,6,11,12], PKI [20], unlinkability [6,11,12] MAC [15], PKI [16], compound identities [15,21] Correctness ---Immutability cipher chains [2], hash chains [7,15] hash chains [7,15] network of peers [16,19] blockchain [21] Integrity forward integrity [2,7,10,14,15] MAC security proof [2] forward integrity [1,6,11,12] forward integrity [15] Interoperability Performance: When it comes to the processing of the event data, various optimisations such as parallel processing and/or indexing should be used to improve processing efficiency. Scalability: Given the volume of events and policies that will need to be handled, the scalability of event data processing is a major consideration.…”
Section: Local Logmentioning
confidence: 99%
“…Unfortunately the authors only touch upon the required features and no concrete architecture is proposed. Seneviratne and Kagal [16] build on this idea by describing how a distributed network of peers can be used to store a permanent log of encrypted transactions. The replication of log entries at each peer optimises both redundancy and availability.…”
Section: Global Ledger and Peer-to-peer Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, medical data can have any link with patients' identification removed before being available for research. Privacy is usually obtained by applying Privacy Enhancing Technologies (PETs) [11][12][13][14]. PETs alone do not ensure transparency, again because they are not designed to address regulation requirements stating that users must be informed.…”
Section: Transparency For Security and Privacymentioning
confidence: 99%
“…Provenance Tracker Network [14] PTN This is a decentralized network of peer servers that maintain the usage logs. No single entity can exercise ownership over the entire collection of log records.…”
Section: Distributed Privacy Preserving Transparencymentioning
confidence: 99%