Towards Measuring Maturity of Privacy-Enhancing Technologies
نویسندگان
چکیده
The assessment of the maturity of Privacy-Enhancing Technologies (PETs) is a complex and challenging task, which can only be performed by experts in the eld. However, at the same time, the need for precise technology readiness and quality de nitions for PETs emerges rapidly. In order to overcome this gap, standardised means to assess, discuss, and compare PET maturity levels are necessary. In this paper, we propose an approach for assessing the maturity of PETs. We de ne both the scales and the methodology for measuring maturity of PETs, in a way that is independent from the domain of application. Based on an in-depth analysis of the criteria to be met by such a PET maturity level scheme, we propose a combined quality-and-readiness level scale to be used for this purpose.
منابع مشابه
Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies
Privacy enhancing technologies (PETs) are regarded as an important building block for implementing privacy guarantees. However, the maturity of different PETs varies and is not easy to determine. In this paper, we present an assessment framework that allows to compare the maturity of PETs. This framework combines two rating scales: one for technology readiness and one for privacy enhancement qu...
متن کاملPrivacy-Enhancing Technologies for the Internet, II: Five Years Later
Five years ago, “Privacy-enhancing technologies for the Internet” [23] examined the state of the then newly emerging privacy-enhancing technologies. In this survey paper, we look back at the last five years to see what has changed, what has stagnated, what has succeeded, what has failed, and why. We also look at current trends with a view towards the future.
متن کاملTowards Measuring Anonymity
This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections. It considers attackers that obtain probabilistic information about users. The degree is based on the probabilities an attacker, after observing the system, assigns to the different users of the system as being the originators of a message. As a proo...
متن کاملOk Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing
In the coming age of wearable computing, devices such as Google Glass will become as ubiquitous as smartphones. Their foreseeable deployment in public spaces will cause distinct implications on the privacy of people recorded by these devices. Particularly the discreet recording capabilities of such devices pose new challenges to consensual image disclosure. Therefore, new Privacy Enhancing Tech...
متن کاملEngineering Privacy in Public: Confounding Face Recognition
The objective of DARPA’s Human ID at a Distance (HID) program “is to develop automated biometric identification technologies to detect, recognize and identify humans at great distances.” While nominally intended for security applications, if deployed widely, such technologies could become an enormous privacy threat, making practical the automatic surveillance of individuals on a grand scale. Fa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015