Privacy Protection Goals and Their Implications for eID Systems

  title={Privacy Protection Goals and Their Implications for eID Systems},
  author={Harald Zwingelberg and Marit Hansen},
Protection goals such as confidentiality, integrity and availability have proved to be successful in evaluating information security risks and choosing appropriate safeguards. The recently developed privacy-specific protection goals unlinkability, transparency and intervenability complement these classic goals and thereby provide cornerstones to define requirements concerning information security as well as privacy and to assess solutions. This text focuses on the application of the three new… 
Protection Goals for Privacy Engineering
Six protection goals provide a common scheme for addressing the legal, technical, economic, and societal dimensions of privacy and data protection in complex IT systems. In this paper, each of these
Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case
The paper presents a Pan-European Identity Management System that was developed through the concerted efforts of several European research initiatives, and identifies gaps in the privacy protection
PRIAM: A Privacy Risk Analysis Methodology
This work proposes a rigorous and systematic Privacy Risk Analysis (PRA) methodology and illustrates it with a quantified self use-case in the extended paper.
Secure & privacy-preserving eID systems with Attribute-Based Credentials
This thesis studies the key concepts and security protocols used in nPA and identifies its main threats, and proposes a specfic scheme that integrates IRMA authentication with nPA, which provides better privacy, security and flexibility for the eID infrastructure.
Conceptual Framework and Architecture for Privacy Audit
The proposed metrics and tools will identify gaps, provide clear suggestions and will assist audit and certification to support informed decisions on the trustworthiness of ICT for citizens and businesses.
Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals
This position paper introduces the approach of privacy protection goals for risk analysis in identity management. It pleads for taking into account external factors such as the data collection via
Legal Data Protection Considerations
This chapter gives an overview of relevant legal issues for the use of Privacy-ABCs. However, only legal issues stemming from privacy or data protection laws are examined. Further considerations
Data Protection by Design for Cross-Border Electronic Identification: Does the eIDAS Interoperability Framework Need to Be Modernised?
It is argued that in an attempt to welcome diverse types of architectures, the Interoperability Framework could have the effect of reducing the data protection level reached by some national eID schemes, when transacting with services that do not require unique identification.
Privacy in the Life-Cycle of IT Services - An Investigation of Process Reference Models
In this paper widely-used process reference models CMMI and ITIL are analysed and it is investigated to what extent privacy is already incorporated and what existing approaches could be recommended otherwise.
Privacy by Design in Federated Identity Management
A catalog of privacy-related architectural requirements, joining up legal, business and system architecture viewpoints, and the demonstration of concrete FIM models showing how the requirements can be implemented in practice are presented.


Identity and Privacy Issues Throughout Life
A comprehensive privacy-enhancing identity management system would include the following components [CK01]: an Identity Manager on the user’s side; IdM support in applications; various third-party services (e.g., certification authorities, identity providers).
PP-SDLC The privacy protecting systems development life cycle
This paper will analyse the way the Common Criteria currently deals with privacy in information systems, and what is needed to improve its current inadequate handling of information privacy.
Privacy and Identity Management for Life
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best
UI prototypes : Policy administration and presentation (version 1)
Investigating understandable and transparent privacy policies as well as simplified and usable privacy preference ( data release policy) management "on the fly" are the objectives of the deliverable.
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
Anonymity, unlinkability, linkability, undetectability, unobservability, pseudonymity, identifiability, identity, partial identity, digital identity and identity management are defined.
Electronic identity management in Sweden: governance of a market approach
This paper reviews the history and current status of electronic identities (eID) and eID management in Sweden, including an outlook for the future. The paper is based on official policy documents,
Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card
This text suggests a model as basis for deriving general guidelines and aids further discussion on the question whether collecting personal data is necessary for certain business cases and poses questions on a European level as well.
A new e-ID card and online authentication in Spain
This paper describes the introduction of a new electronic identity card including an electronic identity (EID) for local physical and online authentication in 2006, where the eID so far covers less than one percent of all online declarations while authentication by software certificates still make up for 98 percent.
PrimeLife Heartbeat H1.3.5: Requirements and concepts for identity management throughout life
This report derives requirements and concepts for identity management throughout life, taking into account lifelong aspects of privacy and identity management which demand for a new consideration of