2013 (English)In: Computer and Information Security Handbook, Elsevier, 2013, 2, 755-772 p.Chapter in book (Other academic)
In our modern information age, recent technical developments and trends, such as mobile and pervasive computing, cloud computing, and Web 2.0 applications, increasingly pose privacy dilemmas. Due to the low costs and technical advances of storage technologies, masses of personal data can easily be stored. Once disclosed, these data may be retained forever, often without the knowledge of the individuals concerned, and be removed with difficulty. Hence, it has become hard for individuals to manage and control their personal spheres. Both legal and technical means are needed to protect privacy and to (re)establish the individuals’ control. This chapter provides an overview to the area of privacy-enhancing technologies (PETs), which help to protect privacy by technically enforcing legal privacy principles. It will start with defining the legal foundations of PETs and will present a classification of PETs as well as a definition of traditional privacy properties that PETs are addressing and metrics for measuring the level of privacy that PETs are providing. Then, a selection of the most relevant PETs is presented.
Place, publisher, year, edition, pages
Elsevier, 2013, 2. 755-772 p.
privacy; privacy-enhancing technologies; personal privacy; legal privacy; legitimacy; purpose specification; purpose limitation; data minimization; transparency; data
Research subject Computer Science
IdentifiersURN: urn:nbn:se:kau:diva-45212DOI: 10.1016/B978-0-12-394397-2.00043-XScopusID: 2-s2.0-84883964402ISBN: 9780123943972 (print)OAI: oai:DiVA.org:kau-45212DiVA: diva2:953756