International audienceIn systems design, we generally distinguish the architecture and the protocol levels. In the context of privacy by design, in the first case, we talk about privacy architectures, which define the privacy goals and the main features of the system at high level. In the latter case, we consider the underlying concrete protocols and privacy enhancing technologies that implement the architectures. In this paper, we address the question that whether a given protocol conforms to a privacy architecture and provide the answer based on formal methods. We propose a process algebra variant to define protocols and reason about privacy properties, as well as a mapping procedure from protocols to architectures that are defined in a h...
Privacy by Design (PbD) is increasingly praised as a key approach to improving privacy protection. N...
Proceedings of: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Ath...
Abstract. Existing work on privacy by design mostly focus on tech-nologies rather than methodologies...
International audienceIn systems design, we generally distinguish the architecture and the protocol ...
International audienceExisting work on privacy by design mostly focus on technologies rather than me...
International audienceThe protection of users' data conforming to best practice and legislation is o...
International audiencePrivacy by design will become a legal obligation in the European Community if ...
Part 2: Full PapersInternational audienceIn this paper, we describe a multi-step approach to privacy...
In this report, we describe a multi-stage approach for privacy by design. The main design step is th...
Security protocols are used in many of our daily-life applications, and our privacy largely depends ...
Formal methods have proved their usefulness for analysing the security of protocols. In this setting...
Privacy and data protection by design are relevant parts of the General Data Protection Regulation (...
—Modern distributed software platforms are linking smart objects such as smartphones, cars and heal...
The goal of the work presented in this paper is to show the applicability of the privacy by design a...
To provide privacy protection, cryptographic primitives are frequently applied to communication prot...
Privacy by Design (PbD) is increasingly praised as a key approach to improving privacy protection. N...
Proceedings of: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Ath...
Abstract. Existing work on privacy by design mostly focus on tech-nologies rather than methodologies...
International audienceIn systems design, we generally distinguish the architecture and the protocol ...
International audienceExisting work on privacy by design mostly focus on technologies rather than me...
International audienceThe protection of users' data conforming to best practice and legislation is o...
International audiencePrivacy by design will become a legal obligation in the European Community if ...
Part 2: Full PapersInternational audienceIn this paper, we describe a multi-step approach to privacy...
In this report, we describe a multi-stage approach for privacy by design. The main design step is th...
Security protocols are used in many of our daily-life applications, and our privacy largely depends ...
Formal methods have proved their usefulness for analysing the security of protocols. In this setting...
Privacy and data protection by design are relevant parts of the General Data Protection Regulation (...
—Modern distributed software platforms are linking smart objects such as smartphones, cars and heal...
The goal of the work presented in this paper is to show the applicability of the privacy by design a...
To provide privacy protection, cryptographic primitives are frequently applied to communication prot...
Privacy by Design (PbD) is increasingly praised as a key approach to improving privacy protection. N...
Proceedings of: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Ath...
Abstract. Existing work on privacy by design mostly focus on tech-nologies rather than methodologies...