Immediate download Privacy and identity management for the future internet in the age of globalisati

Page 1


7 12 2014 Revised Selected Papers 1st Edition Jan Camenisch

Visit to download the full and correct content document: https://textbookfull.com/product/privacy-and-identity-management-for-the-future-intern et-in-the-age-of-globalisation-9th-ifip-wg-9-2-9-5-9-6-11-7-11-4-11-6-sig-9-2-2-internat ional-summer-school-patras-greece-september-7-12-2014-revis/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Privacy and Identity Management Time for a Revolution

10th IFIP WG 9 2 9 5 9 6 11 7 11 4 11 6 SIG 9 2 2

International Summer School Edinburgh UK August 16 21 2015 Revised Selected Papers 1st Edition David Aspinall

https://textbookfull.com/product/privacy-and-identity-managementtime-for-a-revolution-10th-ifipwg-9-2-9-5-9-6-11-7-11-4-11-6-sig-9-2-2-international-summerschool-edinburgh-uk-august-16-21-2015-revised-selectedpapers-1st-edition-d/

Data Driven Process Discovery and Analysis 5th IFIP WG 2 6 International Symposium SIMPDA 2015 Vienna Austria December 9 11 2015 Revised Selected Papers 1st Edition

Paolo Ceravolo

https://textbookfull.com/product/data-driven-process-discoveryand-analysis-5th-ifip-wg-2-6-international-symposiumsimpda-2015-vienna-austria-december-9-11-2015-revised-selectedpapers-1st-edition-paolo-ceravolo/

Advances

in

Digital Forensics

XVI 16th IFIP WG 11 9

International Conference New Delhi India January 6 8 2020 Revised Selected Papers Gilbert Peterson

https://textbookfull.com/product/advances-in-digital-forensicsxvi-16th-ifip-wg-11-9-international-conference-new-delhi-indiajanuary-6-8-2020-revised-selected-papers-gilbert-peterson/

Logic Based Program Synthesis and Transformation 24th

International Symposium LOPSTR 2014 Canterbury UK September 9 11 2014 Revised Selected Papers 1st Edition

Maurizio Proietti

https://textbookfull.com/product/logic-based-program-synthesisand-transformation-24th-international-symposiumlopstr-2014-canterbury-uk-september-9-11-2014-revised-selectedpapers-1st-edition-maurizio-proietti/

Testing Software and Systems 32nd IFIP WG 6 1

International Conference ICTSS 2020 Naples Italy December 9 11 2020 Proceedings Valentina Casola

https://textbookfull.com/product/testing-software-andsystems-32nd-ifip-wg-6-1-international-conferenceictss-2020-naples-italy-december-9-11-2020-proceedings-valentinacasola/

Semantic Technology 4th Joint International Conference

JIST 2014 Chiang Mai Thailand November 9 11 2014 Revised Selected Papers 1st Edition Thepchai Supnithi

https://textbookfull.com/product/semantic-technology-4th-jointinternational-conference-jist-2014-chiang-mai-thailandnovember-9-11-2014-revised-selected-papers-1st-edition-thepchaisupnithi/

Security

and Privacy Second

ISEA

International Conference ISEA ISAP 2018 Jaipur India January 9 11 2019 Revised Selected Papers Sukumar Nandi

https://textbookfull.com/product/security-and-privacy-secondisea-international-conference-isea-isap-2018-jaipur-indiajanuary-9-11-2019-revised-selected-papers-sukumar-nandi/

Advances in Communication Networking 20th EUNICE IFIP

EG 6 2 6 6 International Workshop Rennes France

September 1 5 2014 Revised Selected Papers 1st Edition

Yvon Kermarrec (Eds.)

https://textbookfull.com/product/advances-in-communicationnetworking-20th-eunice-ifip-eg-6-2-6-6-international-workshoprennes-france-september-1-5-2014-revised-selected-papers-1stedition-yvon-kermarrec-eds/

Languages and Compilers for Parallel Computing 28th

International Workshop LCPC 2015 Raleigh NC USA September 9 11 2015 Revised Selected Papers 1st Edition

Xipeng Shen

https://textbookfull.com/product/languages-and-compilers-forparallel-computing-28th-international-workshop-lcpc-2015-raleighnc-usa-september-9-11-2015-revised-selected-papers-1st-editionxipeng-shen/

Privacy and Identity Management for the Future Internet in the Age of Globalisation

9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School Patras, Greece, September 7–12, 2014 Revised Selected Papers

123 TU T O RIA L

IFIPAdvancesinInformation andCommunicationTechnology457

Editor-in-Chief

KaiRannenberg,GoetheUniversity,Frankfurt,Germany

EditorialBoard

FoundationsofComputerScience

JacquesSakarovitch,TélécomParisTech,France

Software:TheoryandPractice

MichaelGoedicke,UniversityofDuisburg-Essen,Germany Education

ArthurTatnall,VictoriaUniversity,Melbourne,Australia

InformationTechnologyApplications

ErichJ.Neuhold,UniversityofVienna,Austria CommunicationSystems

AikoPras,UniversityofTwente,Enschede,TheNetherlands SystemModelingandOptimization

FrediTröltzsch,TUBerlin,Germany InformationSystems

JanPries-Heje,RoskildeUniversity,Denmark ICTandSociety

DianeWhitehouse,TheCastlegateConsultancy,Malton,UK ComputerSystemsTechnology

RicardoReis,FederalUniversityofRioGrandedoSul,PortoAlegre,Brazil SecurityandPrivacyProtectioninInformationProcessingSystems

YukoMurayama,IwatePrefecturalUniversity,Japan

Arti ficialIntelligence

TharamDillon,CurtinUniversity,Bentley,Australia

Human-ComputerInteraction

JanGulliksen,KTHRoyalInstituteofTechnology,Stockholm,Sweden

EntertainmentComputing

MatthiasRauterberg,EindhovenUniversityofTechnology,TheNetherlands

IFIP – TheInternationalFederationforInformationProcessing

IFIPwasfoundedin1960undertheauspicesofUNESCO,followingtheFirstWorld ComputerCongressheldinParisthepreviousyear.Anumbrellaorganizationfor societiesworkingininformationprocessing,IFIP’saimistwo-fold:tosupportinformationprocessingwithinitsmembercountriesandtoencouragetechnologytransferto developingnations.Asitsmissionstatementclearlystates,

IFIP’smissionistobetheleading,trulyinternational,apoliticalorganizationwhich encouragesandassistsinthedevelopment,exploitationandapplicationofinformationtechnologyforthebenefitofallpeople.

IFIPisanon-profitmakingorganization,runalmostsolelyby2500volunteers.It operatesthroughanumberoftechnicalcommittees,whichorganizeeventsandpublications.IFIP’seventsrangefromaninternationalcongresstolocalseminars,butthe mostimportantare:

• TheIFIPWorldComputerCongress,heldeverysecondyear;

• Openconferences;

• Workingconferences.

The flagshipeventistheIFIPWorldComputerCongress,atwhichbothinvitedand contributedpapersarepresented.Contributedpapersarerigorouslyrefereedandthe rejectionrateishigh.

AswiththeCongress,participationintheopenconferencesisopentoalland papersmaybeinvitedorsubmitted.Again,submittedpapersarestringentlyrefereed.

Theworkingconferencesarestructureddifferently.Theyareusuallyrunbya workinggroupandattendanceissmallandbyinvitationonly.Theirpurposeisto createanatmosphereconducivetoinnovationanddevelopment.Refereeingisalso rigorousandpapersaresubjectedtoextensivegroupdiscussion.

PublicationsarisingfromIFIPeventsvary.ThepaperspresentedattheIFIPWorld ComputerCongressandatopenconferencesarepublishedasconferenceproceedings, whiletheresultsoftheworkingconferencesareoftenpublishedascollectionsof selectedandeditedpapers.

Anynationalsocietywhoseprimaryactivityisaboutinformationprocessingmay applytobecomeafullmemberofIFIP,althoughfullmembershipisrestrictedtoone societypercountry.FullmembersareentitledtovoteattheannualGeneralAssembly, Nationalsocietiespreferringalesscommittedinvolvementmayapplyforassociateor correspondingmembership.Associatemembersenjoythesamebenefitsasfullmembers,butwithoutvotingrights.CorrespondingmembersarenotrepresentedinIFIP bodies.Affiliatedmembershipisopentonon-nationalsocieties,andindividualand honorarymembershipschemesarealsooffered.

Moreinformationaboutthisseriesathttp://www.springer.com/series/6102

JanCamenisch • SimoneFischer-Hübner MaritHansen(Eds.)

9thIFIPWG9.2,9.5,9.6/11.7,11.4,11.6/SIG9.2.2 InternationalSummerSchool Patras,Greece,September7–12,2014

RevisedSelectedPapers

Editors

JanCamenisch

IBMResearchZurich

Rüschlikon

Switzerland

SimoneFischer-Hübner

KarlstadUniversity

Karlstad

Sweden

MaritHansen

UnabhängigesLandeszentrum fürDatenschutzSchleswig-Holstein (ULD)

Kiel Germany

ISSN1868-4238ISSN1868-422X(electronic)

IFIPAdvancesinInformationandCommunicationTechnology

ISBN978-3-319-18620-7ISBN978-3-319-18621-4(eBook) DOI10.1007/978-3-319-18621-4

LibraryofCongressControlNumber:2015938757

SpringerChamHeidelbergNewYorkDordrechtLondon © IFIPInternationalFederationforInformationProcessing2015 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped.

Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse.

Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors giveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforanyerrorsor omissionsthatmayhavebeenmade.

Printedonacid-freepaper

SpringerInternationalPublishingAGSwitzerlandispartofSpringerScience+BusinessMedia (www.springer.com)

Preface

Newtechnologiessuchassocialmedia,cloudcomputing,bigdata,andubiquitousand ambienttechnologiesoperateonaglobalscale,theirusenotonlytouchesthecountries wheretheyoriginate(inmanycases,theUSA),butindividualsandgroupsaroundthe globe.Therecentrevelationsregardingthesurveillancepracticesfurtherprovethat personaldataiscommunicated,collected,andprocessedonaglobalscale.Privacyand identitymanagementissueshavehencebecomeglobalissuesrequiringtheattentionof multipledisciplines,bothtechnical(computerscience,cryptography)andnon-technical (law,ethics,socialsciences,philosophy),andtheneedtolookbeyondnationalborders.

Now,howcantheindividuals’ privacyrightsbeachievedeffectivelyinaglobalizinginformationsocietyinwhichbothstatesandprivateenterprisesexhibitgreatdata hunger?Whattechnologies,frameworks,andtoolsdoweneedtogain,regain,and maintaininformationalself-determinationandlifelongprivacy?Dowehavetoadvance theconceptsofprivacyandidentitymanagementinthisquicklyevolvingworld?

ThesequestionsandmanyotherswereaddressedbytheIFIPSummerSchool2014 onPrivacyandIdentityManagementfortheFutureInternetintheAgeofGlobalization.TheSummerSchoolorganizationwasajointeffsortofIFIP(International FederationforInformationProcessing,WorkingGroups9.2,9.5,9.6/11.7,11.4,11.6, SpecialInterestGroup9.2.2),theUniversityofPatras,Kritiki,andtheEUresearch projectsABC4Trust,A4Cloud,AU2EU,PRISMS,andFutureID.

TheaimoftheIFIPSummerSchoolistraditionallymanifold:toincreasethe researchcommunityinprivacyandidentitymanagement,tofurtherresearch,andto enabletheupdateofprivacy-enhancingtechnologies.Toaddressthis,theschoolhas invitedanumberofkeynotespeakersandheldsessionswithcontributedpapersand workshopsdedicatedtothediscussionofparticulartopics.

Thistime,thesummerschoolwashonoredtohavekeynotepresentationsby RehabAlnemr,KimCameron,MichaelFriedewald,ZoiKolitsi,GeorgeMetakides, MaritHansen,JoachimMeyer,GregoryNeven,ChristineO’Keefe,BartPreneel, NadyaPurtova,KaiRannenberg,MarcvanLieshout,andAimeevanWynsberghe. Thankyouallforyourgreattalks!

Complementingthekeynotes,thesummerschoolfeaturedanumberofparallel workshopsessions.Elevenofthesewerededicatedtothepresentationanddiscussion ofthepapersselectedfromthesubmissions.Inadditiontothis,therewereanumberof otherworkshopswheretopicswerediscussed.

TheABC4Trustprojectarrangedforfourworkshopsessionsdiscussingdifferent aspectsofattributed-basedcredentialssupportingprivacy(Privacy-ABCs).The fi rst workshopsessionfocusedonnewapplicationscenariosandstoragedevicesforcredentialssuchasmobiledevicesandsmartcards.Thesecondonediscussedthepractical useofinspectionandrevocationinthecontextofanonymouscredentials.Thethird workshopsessionwasconcernedwithdataprotectionandprivacyrequirementsaswell asthelegalcontextforPrivacy-ABCs.Inthefourthsession,theparticipantscouldget

theirhandsonthePrivacy-ABCs:itwasexplainedhowtodownloadandinstallthe codeavailablefromtheABC4Trustrepositoryandhowtobuildapplicationson topofit.

TheA4Cloudprojectgaveatutorialonaccountabilitymetricsandtoolsthathave beendevelopedwithintheA4Cloudproject.

Finally,aSmartSocietyProjectworkshopwasheldonethicalaspects,privacyrisks, andtechnicalprivacysolutionsinrelationtoPeerProfilinginCollectiveAdaptive Systems.

Thisbookcontainsthethoroughlyrefereedpost-conferenceproceedingsofthe summerschool.Inparticular,itcontainsrevisedpapersselectedfromnumeroussubmissions.Inthe firstround,submittedpaperswerereviewedandselectedforpresentationatthesummerschool.Mostofthesepaperswererevisedbasedonthecomments anddiscussionsatthesummerschoolandhaveundergoneasecondthoroughroundof review(by2to5reviewers),selection,andrevisiontobeincludedinthepresent proceedings.

Inadditiontothesepapers,theproceedingscontainfourkeynotepapers: “Privacy andSecurityPerceptionsofEuropeanCitizens:ATestoftheTrade-offModel” by MichaelFriedewald,MarcvanLieshout,SvenRung,MerelOoms,andJelmerYpma, “TowardsanEngineeringModelofPrivacy-RelatedDecisions” byJoachimMeyer, “PrivacyandConfi dentialityinServiceScienceandBigDataAnalytics” byChristine O’Keefe,and “ABC4Trust:ProtectingPrivacyinIdentityManagementbyBringing Privacy-ABCsintoReal-life” byAhmadSabouriandKaiRannenberg.

Finally,theProgramCommitteeChairsselectedthepaperentitled “EventInvitationsinDecentralizedOnlineSocialNetworks:FormalizationandProtocolDesign” by GuillermoRodríguez-Canoetal.fortheBestStudentPaperAward.Congratulations Guillermo!

Weexpressourgratitudetothenumerouspeoplewhomadethesummerschoolsuch asuccess:alltheauthorswhosubmittedpapers,thekeynotespeakers,theparticipants, and,lastbutclearlynotleast,themembersoftheorganizingandtheProgramand SteeringCommitteesaswellastheadditionalreviewers.Inparticular,weowespecial thankstotheLocalOrganizersfromtheUniversityofPatras,PanagiotaPanagopoulou, VasiaLiagkou,andYannisStamatiou,fortheirgreathospitalityandsupport.

Thankyou!

March2015JanCamenisch

SimoneFischer-Hübner MaritHansen

Organization

ProgramCommittee

KarinBernsmedSINTEF,Norway

FranziskaBoehmMünsterUniversity,Germany

KatrinBorcea-P fitzmannTechnischeUniversitätDresden,Germany

CasparBowdenPrivacyAdvocate,UK

IanBrownOxfordUniversity,UK

SonjaBucheggerRoyalInstituteofTechnology(KTH),Sweden

JanCamenischIBMResearch,Switzerland

BartDeDeckerKatholiekeUniversiteitLeuven,Belgium PennyDuquenoyMiddlesexUniversity,UK

DavidErdosUniversityofCambridge,UK

SimoneFischer-HübnerKarlstadUniversity,Sweden

SaraForestiUniversityofMilan,Italy

MichaelFriedewaldFraunhoferInstituteforSystemsandInnovation Research(ISI),Germany

LotharFritschNorwegianComputerCenter,Norway

ThomasGrossNewcastleUniversity,UK

MaritHansenUnabhängigesLandeszentrumfürDatenschutz

Schleswig-Holstein(ULD),Germany

Jaap-HenkHoepmanRadboudUniversity,TheNetherlands

Bert-JaapKoopsTilburgUniversity,TheNetherlands EleniKostaTilburgUniversity,TheNetherlands

IoannisKrontirisHuaweiTechnologiesCo.Ltd.,Germany

LouiseLeenenCSIR,SouthAfrica

RonaldLeenesTilburgUniversity,TheNetherlands

VasilikiLiagkouUniversityofPatras,Greece

Refi kMolvaEurecom,France

MaartjeNiezenTilburgUniversity,TheNetherlands

NorbertoPatrignaniPolitecnicodiTorino,Italy

SianiPearsonHPLabs,UK

CharlesRaabEdinburghUniversity,UK

JohannekeSiljeeTNO,TheNetherlands

EinarSnekkenesGjøvikUniversityCollege,Norway

BibiVanDenBergLeidenUniversity,TheNetherlands

JozefVyskocVaF,SlovakRepublic

DianeWhitehouseTheCastlegateConsultancy,UK

DavidWrightTrilateralResearch&Consulting,UK

ErikWästlundKarlstadUniversity,Sweden

TalZarskyHaifaUniversity,Israel

Rose-Mharie ÅhlfeldtUniversityofSkövde,Sweden

Melek ÖnenEurecom,France

AdditionalReviewers

Milutinovic,Milica Put,Andreas

InvitedKeynotePapers

ABC4Trust:ProtectingPrivacyinIdentityManagementbyBringing Privacy-ABCsintoReal-Life..................................3 AhmadSabouriandKaiRannenberg

TowardsanEngineeringModelofPrivacy-RelatedDecisions............17 JoachimMeyer

TheValueofPersonalData...................................26 MarcvanLieshout

PrivacyandSecurityPerceptionsofEuropeanCitizens: ATestoftheTrade-OffModel.................................39 MichaelFriedewald,MarcvanLieshout,SvenRung,MerelOoms, andJelmerYpma

PrivacyandConfidentialityinServiceScienceandBigDataAnalytics.....54 ChristineM.O’Keefe

LegalPrivacyAspectsandTechnicalConcepts

TheCourtofJusticeoftheEuropeanUnion,DataRetentionandtheRights toDataProtectionandPrivacy – WhereAreWeNow?................73

FelixBieker

EUROSUR – ASci-fiBorderZonePatrolledbyDrones?..............87 DanielDeibler

AnonymousePetitions – AnotherStepTowardseDemocracy............110 HannahObersteller

ABriefEvaluationofIconsintheFirstReadingoftheEuropeanParliament onCOM(2012)0011.......................................125 JohnSörenPettersson

PrivacybyDesignandPrivacyPatterns

PrivacybyDesign – TheCaseofAutomatedBorderControl............139 PagonaTsormpatzoudi,DianaDimitrova,JessicaSchroers, andElsKindt

PatternsinPrivacy-APattern-BasedApproachforAssessments.........153

JörnKahrmannandInaSchiering

PrivacyTechnologiesandProtocols

ASurveyonMultimodalBiometricsandtheProtection ofTheirTemplates.........................................169

Christina-AngelikiToliandBartPreneel

EventInvitationsinPrivacy-PreservingDOSNs:Formalization andProtocolDesign........................................185

GuillermoRodríguez-Cano,BenjaminGreschbach,andSonjaBuchegger

BlankDigitalSignatures:OptimizationandPracticalExperiences.........201

DavidDerler,ChristianHanser,andDanielSlamanig

ProjectWorkshopsandTutorialPapers

ToolsforCloudAccountability:A4CloudTutorial...................219

CarmenFernandez-Gago,VasilisTountopoulos,SimoneFischer-Hübner, RehabAlnemr,DavidNuñez,JulioAngulo,TobiasPulls, andTheoKoulouris

PrivacyforPeerProfilinginCollectiveAdaptiveSystems..............237

MarkHartswood,MarinaJirotka,RonaldChenu-Abente,AlethiaHume, FaustoGiunchiglia,LeonardoA.Martucci,andSimoneFischer-Hübner

ABC4TrustWorkshoponCoreFeaturesofPrivacy-ABCs,PracticalUse, andLegalIssues...........................................253

FelixBieker,MaritHansen,GertLæssøeMikkelsen, andHannahObersteller

AuthorIndex

InvitedKeynotePapers

DeutscheTelekomChairofMobileBusinessandMultilateralSecurity, GoetheUniversityFrankfurt,Theodor-W.-Adorno-Platz4,60323Frankfurt,Germany {Ahmad.Sabouri,Kai.Rannenberg}@m-chair.de https://www.abc4trust.eu

Abstract. SecurityoftheIdentityManagementsystemorprivacyof theusers?Whynotboth?Privacy-preservingAttribute-basedCredentials(Privacy-ABCs)cancopewiththisdilemmaandofferabasisfor privacy-respectingIdentityManagementsystems.

ThispaperexplainsthedistinctfeaturesofPrivacy-ABCsasimplementedintheEU-sponsoredABC4TrustprojectviaexampleusagescenariosfromtheABC4Trustpilottrials.Inparticular,itaimsforadeeper insightfromtheapplicationperspectiveonhowPrivacy-ABCscansupportaddressingreal-lifeIdentityManagementrequirementswhileusers’ privacyisprotected.

1Introduction

Asusingonlineservicespenetratesdeeperinoureverydaylife,lotsoftrustsensitivetransactionssuchasbankingandshoppingarecarriedoutonlineand manyuserswouldprefertoperformtheirtransactionsonlineratherthanfollow thetraditionalprocedures.Inthisregard,thebiggestchallengesaretodeal withproperuserauthenticationandaccesscontrol,withoutthreateningusers’ privacy.

ThecurrentlyemployedIdentityManagementsystemshavelimitationswhen itcomestousers’privacy.Nevertheless,newpromisingtechniques,knownas Privacy-ABCs,haveemergedtoenableprivacy-respectingIdentityManagement solutions.Inthisregard,theABC4TrustEUProject1 putconsiderableeffortto fosteradoptionofsuchtechnologiesbydesigninganarchitecturalframeworkfor Privacy-ABCs,implementingit,andtriallingitintwopilots.

Inthispaper,weaimtoelaborateonthemostimportantfeaturesprovidedby Privacy-ABCsviareal-lifeexampleusagescenariosfromtheABC4Trusttrials. Therestofthispaperisorganizedasfollows.Section 2 describestheissuesofthe existingIdentityManagementsystems.InSect. 3,weintroducePrivacy-ABCs andexplainhowtheywork.LaterwedescribetheABC4TrustpilotsinSect. 4.

1 https://abc4trust.eu

c IFIPInternationalFederationforInformationProcessing2015 J.Camenischetal.(Eds.):PrivacyandIdentity2014,IFIPAICT457,pp.3–16,2015. DOI:10.1007/978-3-319-18621-4 1

Section 5 focusesonthemostimportantfeaturesofPrivacy-ABCsandtherewe elaboratehowthesefeatureshelptodealwiththerequirementsofthepilots. LaterinSect. 6,webrieflydescribetheABC4TrustarchitectureforPrivacyABCsandthenconcludethepaperinSect. 7.

2PrivacyIssuesinIdentityManagement

Thischapterdescribestheprivacyissuesinnowadaysdigitalidentitymanagementsystems.Althoughmostofthecommonlyusedstrongauthenticationtechniquesofferasuitablelevelofsecurity,theyarenotappropriatelydesignedto protecttheprivacyoftheusers.Forinstance,useofX.509[1]certificatescauses “Over-identification”bymandatingtheuserstorevealalltheattestedattributes inthecertificatetopreservethevalidityofthedigitalsignatureevenifonlya subsetofattributesisrequiredfortheauthenticationpurpose.Apartfromthis, theonlineusersalsohavetobeabletocompartmentalizetheiractivitiesindifferentdomainsandpreventprofilingbybothServiceProvidersandIdentityService Providers(IdSP).Evidently,thestaticrepresentationofX.509certificatesfails toaddresstheproblemandmakesitpossibletotraceusers’onlineactivities.

UsingonlineauthenticationandauthorizationtechniquessuchasOpenID[2], SAML[3],FacebookConnect[4],andOAuth[5]couldsupporttheminimal disclosureprinciple,astheyenabletheusertoprovidetheServiceProviderwith onlytherequestedinformationratherthanthewholeuser’sprofilestoredat theIdSP.However,alltheseprotocolssufferfromaso-called“CallingHome” problem,meaningthatforeveryauthenticationtransactiontheuserisrequired tocontacttheIdSP(e.g.,Facebook,OpenIDProvider).Thisintroducesprivacy riskstobothusersandServiceProviders.Morespecifically,itwouldnotbe difficultfortheIdSPtotracetheuserandprofileheronlineactivitiesduetothe knowledgeitgainsabouttheServiceProvidersshevisits.Moreover,theIdSP cancollectaconsiderableamountofinformationaboutaServiceProviderby analysingtheprofileoftheuserswhorequesttoauthenticatetothatspecific service.

Insummary,whendesigningidentitymanagementandaccesscontrolsystems inspiredbytheparadigmofPrivacybyDesign,thefollowingconceptsrelated todatathriftinessshallbeofdirectorindirectinterestforbodiesworkingon privacy-friendlyecosystems:

–PartialIdentitiesandPartialIdentifiers:Moreandmorepublicandprivate partiesaretryingtoovercomethenaturalbordersbetweendomainsofactivities,makingusersevermoretransparentfromevermoreperspectives,e.g.for manyServiceProvidersofferingservicesthatrelatetodifferentpartsofusers’ lives.PartialIdentitiesandPartialIdentifiersbecomemoreandmoreimportantforuserstoretainthesebordersbyreducingthedangersofunwanted linkabilityacrossdomains.ThereforethedefinitionofIdentityasa“setof attributesrelatedtoanentity”,thathasbeengloballystandardizedinthe Part1oftheframeworkforidentitymanagement[6]developedbyISO/IEC

JTC1/SC27/WG5“IdentityManagementandPrivacyTechnologies”,is usefulfordesigningprivacy-respectingidentitymanagement.

–Unlinkability:UnlinkabilityisrelatedtoPartialIdentitiesandIdentifiers,but inthiscontextfocussesonmultipleusesofserviceswithinonedomain.It ensuresthatausermaymakemultipleusesofresourcesorserviceswithout othersbeingabletoprofiletheseactivities.

–MinimalDisclosure:ItisacommonpracticethatServiceProvidersrelyon theinformationaboutusersprovidedbyotherentitiesthathaveanauthentic profileofusers’attributes.However,theseentitiestypicallypossessaricher collectionofinformationthanisneededbytherespectiveServiceProvider.In thisregard,theusersshouldhavethepossibilitytocalibratetheamountof disclosedinformationtotherequestedsetonly.Thereforeonthesideofthe ServiceProvidersriskmanagementprocessescompatiblewiththeminimal disclosureneedtobeestablished.

3Privacy-PreservingAttribute-BasedCredentials (Privacy-ABCs)

Privacy-ABCscanofferstrongauthenticationandahighlevelofsecuritytoService Providerswithuserprivacypreserved,sothatitfollowstheparadigmofMultilateralSecurity[7].UserscanobtaincertifiedattributesintheformofPrivacy-ABCs, andlaterderiveunlinkabletokensthatonlyrevealthenecessarysubsetofinformationneededbytheServiceProviders.ProminentinstantiationsofsuchPrivacyABCtechnologiesareMicrosoftU-Prove2 [8]andIBMIdemix3 [9].

ACredentialisdefinedtobe“acertifiedcontainerofattributesissuedby anIssuertoaUser”[10].AnIssuervouchesforthecorrectnessoftheattribute valuesforaUserwhenissuingacredentialforher.Forexample,aschoolcan issuean“EnrolmentCredential”forapupil,whichcontainsseveralattested attributessuchasfirstname,lastname,studentidandtheenrolmentyear.

AtypicalauthenticationscenariousingPrivacy-ABCsisshowninFig. 1 whereaUserseekstoaccessanonlineserviceofferedbyaServiceProvider. TheServiceProviderperformsaso-calledVerifierroleandexpressesitsrequirementforgrantingaccesstotheserviceintheformofaPresentationPolicy.In

2 http://www.microsoft.com/uprove.

3 http://www.zurich.ibm.com/idemix/

Fig.1. Asamplepresentationscenario

Fig.2. EntitiesandrelationsinthePrivacy-ABC’sarchitecture[10]

thenextstep,theUserneedstocomeupwithacombinationofhercredentialstoderiveanacceptableauthenticationtokenthatsatisfiesthegivenpolicy. AftertheVerifierconfirmstheauthenticityandcredibilityofthePresentation Token,theUsergainsaccesstothecorrespondingservice.Itisworthnoting thatthehumanUserisrepresentedbyherUserAgent,asoftwarecomponent runningeitheronalocaldevice(e.g.,ontheUser’scomputerormobilephone) orremotelyonatrustedcloudservice.Inaddition,theUsermayalsobind credentialstospecialhardwaretokens,e.g.smartcards,toimprovesecurity.

AsFig. 2 shows,inadditionto User, Issuer,and Verifier,twoother(optional) entitiesareinvolvedduringthelife-cycleofPrivacy-ABCs[10].TheRevocation Authorityisresponsibleforrevokingissuedcredentials.BoththeUserandthe VerifiermustobtainthemostrecentrevocationinformationfromtheRevocationAuthoritytogeneratepresentationtokensandrespectively,verifythem. TheInspectorisanentitywhocande-anonymizepresentationtokensunder specificcircumstances.Tomakeuseofthisfeature,theVerifiermustspecifyin thepresentationpolicytheconditions,i.e.,whichInspectorshouldbeableto recoverwhichattribute(s)andunderwhichcircumstances.TheUserisinformed aboutthede-anonymizationoptionsatthetimethatthepresentationtokenis generatedandshehastobeinvolvedactivelytomakethispossible.

TheECfundedprojectAttribute-basedCredentialsforTrust(ABC4Trust)4 broughtallthecommonfeaturesoftheexistingPrivacy-ABCtechnologies togetherandprovidedaframeworkabstractingfromtheconcretecryptographic realizationofthemodulesunderneath.ThisgivessoftwaredeveloperstheflexibilitytobuildPrivacy-ABCenabledsystemswithoutconcernaboutwhatcryptographicschemeswillbeemployedatthebottomlayer.Asadirectresult,the

ServiceProvidersarefreetochoosefromthoseconcretecryptographiclibraries thatimplementtheABC4Trustrequiredinterfaces,andplugthemintotheir softwaresolutions.Thishelpstoavoidalock-inwithaspecifictechnology,as thethreatofalock-inreducesthetrustintoaninfrastructure.

4TriallingPrivacy-ABCsinRealLifeApplications

TheABC4TrustprojectrealizedthefirsteverimplementationofPrivacy-ABC systemsinproductionenvironmentsandgatheredexperiencesonoperation, interoperability,useracceptance,andsoforthintwospecifictrials.Havingthese twopilotsgavetheopportunitytotestPrivacy-ABCsuseandperformancewith twousergroupsofdifferingskillsandneeds.OneusergroupwerewerestudentsataGreekuniversity,whereastheothergroupwerepupilsataschoolin Sweden.Thetrialsweredesignedquitedifferentinordertocoverabroadvariety ofrequirementsandthusaswellcredentials.

4.1OnlineCourseEvaluation

Astandardpracticeinmostuniversitiesistocollecttheopinionsofthestudentswhohavetakenacourseandtoevaluatedifferentaspectsofthatcourse tofurtherimprovethequalityofeducation.However,boththestudentsandthe professorshavelegitimateconcernsabouttheprocessofcourseevaluation.The studentsmaybeworriedabouttheiridentitiesbeinglinkedtotheirevaluation forms,resultinginnegativeimpactsontheirgradesoreducationrecords.Meanwhile,professorsconsideraminimumlevelofparticipationinthelecturestobe necessaryforthestudentstogettherealexperienceofthecourseandtherefore tobeeligibletoevaluateit.Thescenariobecomesevenmorecomplexinterms ofsecurity,privacy,andtrust,whenelectronicevaluationisdesired.

Privacy-ABCscouldhelptoaddresstheaforementionedrequirementsinan onlinecourseevaluationsystem.Inthisregard,ABC4Trustexecutedtworounds oftrialsinFall2012andFall2013atthePatrasUniversityinGreecetorealize suchasystem.Whilsttheidentityandprivacyofthestudentswereprotected, theopinionsofthestudents,whohadattendedmorethanacertainnumberof lectures,werecollectedviaanevaluationportal.

Atthebeginningofthesemester,thepilotparticipantswereprovidedwith theirstart-upkitincludingsmartcardsandnecessarylogininformationenabling theparticipantstobootstraptheiraccesstothepilotsystem,registertheirsmart cardsandobtaintheirPrivacy-ABCsfromtheidentitymanagementsystem.

Aftertheinitializationactionsweretakenatthebeginningofthesemester, thestudentscouldrecordtheirparticipationinthelecturesontheirsmartcards. Uponenteringthelectureroom,everystudenthadtoswipehercardinfront ofthedeviceinstalledintheroominordertocollectattendanceunitsforthat specificlecture.Itisimportanttomentionthattheseunitswerecollectedanonymously,meaningthatnoidentifiableinformationwastransferredtothesystem, whichotherwisemighthaveledtoprivacybreaches.Therefore,theattendance

recordswereonlystoredonthesmartcardsofthestudentsandnotanywhere else.

Duringtheevaluationperiod,thestudentcouldaccesstheevaluationform onlineandsubmittheiropinioniftheycouldprovethat:

1.theyareastudentoftheuniversity, 2.theyareregisteredinthecourse, 3.theyhaveattendedatleastaminimumnumberofthelecturesfromthe course.

Ifalltheseconditionsweremet,thesmartcardcouldproduceaPrivacy-ABCs presentationproofthatattestedthestudent’seligibilitytoevaluatethecourse. Whileitwasnotpossibletolinktheevaluationstotheidentityoftheparticipants,theauthenticationstepwasdesignedinawaythattheevaluationportal couldpreventthesameusersfromsubmittingmultipleevaluations.

ThesecondroundofthetrialaimedtofurthertestthePrivacy-ABCs’featuresdevelopedinABC4Trustinanactualdeploymentenvironment.Newfeaturessuchasrevocationofcredentials,advanceissuance,andinspectionoftokens (de-anonymization)wereimplementedandintroducedintothepilot.Thescenariosofthefirstroundwereextendedinordertobestintegratethesenewfeatures. Morespecifically,afterthestudentssubmittedtheirevaluations,theycould receiveanewcredentialallowingthemtolatertakepartinaprivacy-friendly tombola.Whenthewinnerwasselected,heridentitywasrevealedthroughthe inspectionofherpresentationtoken.Inthisphase,therewasnoprivacyriskfor thewinnerwithregardtotheevaluationsheprovided,astheonlyinformation onecouldlearnwasthatthewinnerhadsubmittedanevaluationform.

4.2SchoolCommunityInteractionPlatform

TheNorrtullskolanschoolinS¨oderhamn,Sweden,hostedthesecondpilot ofABC4Trust,whereaprivacy-friendlycommunicationplatform,builtupon Privacy-ABCs,wasdeployedtoencouragecommunicationbetweenpupils,their parentsandschoolpersonnel.Thepupilswereabletoauthenticatethemselves inordertoaccessrestrictedonlineactivitiesandrestrictedinformation.Moreover,theywereabletoremainanonymouswhentheyaskedprivateandsensitive questionstoschoolpersonnel,whilesimultaneouslyassuringtheschoolpersonnelthattheywerecommunicatingwiththeauthorisedpupilsoftherespective schoolorclass.

Theplatformwasdevelopedasaweb-basedapplicationtobeusedforchat communication,counselling,politicaldiscussions,andexchangeofsensitiveand personaldatabetweenpupils,parents,andschoolpersonnelsuchasteachers, administrators,coaches,andnurses.ThispilotspeciallyhelpedtogatherinformationontheusabilityofthePrivacy-ABCsystemsunderespeciallychallenging usabilityconditionsposedbychildrenusers.Duetothewiderangeofactivities inthistrial,thepilotwasoperatedintworoundswherethefirstroundwason asmallerscaletoinvestigatethescalabilityoftheplatformandthusbeableto addressitsshortcomingsbeforealargerscaledeployment.

Allthepilotparticipantswereequippedwiththenecessaryhardwaresothat theycouldusetheplatformfromtheirpersonalcomputersaswellasthecomputersintheschool.Thesmartcardswerepreloadedwithasetofcredentials thatspecifiedtheparticipants’basicinformationsuchasfirstname,lastname, andbirth-date,theirroles(i.e.pupil,parent,teacher,nurse,etc.),theclasses andcoursesthatthepupilswereenrolledin,consequentlygivingthechanceto definetheaccesspoliciesbasedontheseattributesinthecredentials.

Thecommunityinteractionplatformusedanabstractmodelcalled“Restricted Area”(RA)thatprovidedthevirtualenvironmentfortheaforementionedcommunicationactivities.Everyusercouldinitiatesuchaprivatespaceanddefine accesspoliciesinordertorestricttheparticipationtoherdesiredtargetgroup. Forexample,ateachercouldcreateanRAwith“Chat”functionalitytocollect theopinionsofthepupilsaboutherteachingmethodsandlimittheaccessto thischatroomtoparticipantsofaspecificclass.Inthiscase,thepupilsofthat classcouldjointhediscussionwithoutbeingidentified,whiletheotherstudents fromtheschoolwereprohibitedtoenterthischatroom.

5Privacy-ABCsFeatures

InthissectionweintroducesomeofthemostimportantfeaturesofPrivacyABCsalongwithexamplesoftheirusageintherealscenariosofourtrials. Insummary,wetalkaboutpseudonymsandtheirrelationtopartialidentities, minimaldisclosure,untraceabilityandunlinkability,advancecredentialissuance techniques,Inspectionprocess,andsecuritymechanisms.

5.1MultiplePseudonyms

UsingX.509certificates,auserisidentifiedbyherpublickey,whichisassociated withhersecretkey.Theissuehereisthatforeverysecretkeythereisonlyone publickey.Asaresult,theuserwillbelinkableacrossdifferentdomainswhere thepublickeyisused,unlesssheacceptsthehassleofmanagingmultiplekey pairs.Theconceptof“pseudonyms”inPrivacy-ABCsystemcanbeconsideredas equivalenttopublickeys.However,themajordifferenceisthat“many”different unlinkablepseudonymscanbederivedfromasinglesecretkey,allowingthe usertoestablishpartialidentitiesindifferentdomainsthatarenotpossibleto correlate.

TheS¨oderhamnpilotofABC4Trustheavilybenefitedfrompseudonymsto realizetheconceptof“Alias”intheirSchoolCommunityInteractionPlatform. Everypupilhasthepossibilitytoappearintheonlinecommunityundervarious humanfriendlynicknames(aliases)representingpartialidentities.Thesealiases areboundtoPrivacy-ABCpseudonymsbehindthescenes.Onceauserrequests anewalias,thesystemchecksthedatabasetoensurethatthealiasisnotalready registered.Whenthereisnoconflict,theusersubmitsapseudonymboundto theselectedaliasnametoberegisteredinthedatabase.Afterwards,whenever theuserdesirestologinunderthatalias,thesystemrequirestoproduceand

proveownershipofthesamerelatedpseudonym.Asaresult,noimpersonation ispossibleandnobodycanfigureoutwhethertwoaliasesbelongtothesame person.

5.2IdentifyingReturningUsers

EventhoughunlinkablePrivacy-ABCpseudonymsareveryattractivetosupport users’privacy,sometimesasystemmayfaildeliveringitsserviceifacertain leveloflinkabilityisnotprovided.Toelaboratemoreonsuchcases,wetake theexampleoftheABC4TrustPatraspilot,whereanonlinecourseevaluation systemwasimplemented.

Aprivacy-respectingcourseevaluationsystemmustallowthestudentsto fillthequestionnaireandexpresstheiropinionwithoutbeingidentified.However,theresultcouldbemanipulatedifthestudentshavethepossibilityto establishmultiplepartialidentitiestosubmitmultipleevaluationsunderdifferentpseudonyms,andthereforepositivelyornegativelyinfluencetheaggregated results.Thus,foracorrectandaccuratedeliveryoftheservice,thecourseevaluationsystemmustbeabletolinktheuserstotheirpreviousvisitsofthesystem andonlyallowthemto“update”theirevaluations,insteadofsubmittinganew entry.Atthesametime,thereshouldnotbeawaytolearnabouttheidentity ofthestudents.

“Scope-exclusive”pseudonymsarespecialtypesofPrivacy-ABCpseudonyms thatenabletheServiceProvidertoforcetheuserstoshowthesamepseudonym giventhesame“scope”string.Therefore,whenevertheusersvisitthecourse evaluationportal,theyfaceapolicyrequiringascopeexclusivepseudonymfora fixedscope.Asaresult,theyareobligedtoproducethesamepseudonymvalue everytime,allowingthesystemtorecognizeareturninguser.

5.3Minimal,Untraceable,andUnlinkablePresentation ofCredentials

InaPrivacy-ABCsystem,userscanreceivecertifiedclaimsabouttheirattributes intheformofcredentials.Forexample,aCivilRegistrationAuthorityisentitledtoissueauthenticcredentialsattestingname,lastname,birth-date,etc., representinganIDcard.

Privacy-ABCsprovidethreedistinctfeaturestotheirusers.Let’stakethe SchoolCredentialoftheS¨oderhamnpilotasthebasisforourexampleshere. TheSchoolCredential(alsocalledCredSchool)isequivalenttoamembership cardandcontainsthefirstname,lastname,birth-date,andtheschoolname.As mentionedearlier,thepupilscouldlogintothesystemusingahumanfriendly nickname,calledalias,whichisnotlinkabletotheirrealidentities.Inorderto participateinaschool-boundactivity,suchasapoliticaldiscussion,asample accesspolicywouldrequireaproofthattheyarefromthesameschool(i.e. Norrtullskolan).

X.509certificatesrequireuserstopresenttheircertificateasitisneededto preservetheintegrityofthesignature.Thisurgestheuserstodisclosetheir

firstname,lastname,andthebirth-dateeventhoughonlytheschoolname wasneeded.Conversely,Privacy-ABCssupportminimaldisclosureallowingthe userstoselectivelydiscloseasubsetoftheattributesfromtheircredentials.In theexampleoftheS¨oderhamnpilot,thepupilscouldusetheirCredSchoolto revealonlytheschoolnamewhilstkeepingtheotherattributeshidden.Inthis waythesystemdidnotlearnanyfurtherinformationthanneeded.Moreover, Privacy-ABCssupport“predicatesoverattributes”enablingtheuserstoprove somefactsabouttheirattributeswithoutactuallyrevealingthem.Forinstance, thepupilscouldprovethattheirbirth-datefromtheCredSchoolisbeforeagiven dateandthereforetheyareolderthanacertainage,andstillkeeptheiractual birth-datehidden.

AnotheradvantageofPrivacy-ABCscanbebetterexplainedwhenfocusing onthestaticrepresentationofX.509certificates.AnX.509usercouldbeimmediatelyidentifiedwhentheServiceProviderandthecertificateissuercollude. Inanotherword,theuseofthecredentialsistraceablebytheissuerduetothe staticrepresentationofthecertificatesduringtheissuanceandthepresentationsteps.Despite,Privacy-ABCsexperiencesometransformationsbetweenthe issuanceandpresentationphasesothereisnowaytotracetheirusage,unlessthe revealedattributesgivesuchanopportunity.Inourexample,thepupilscould usetheirCredSchooltoprovethattheyarepartoftheNorrtullskolan,andthis pieceofinformationwouldnotallowacolludingcredentialissuertoidentifythe users.

Similarly,thesamestaticnatureofX.509certificatesenablesanotherprivacythreattotheusers.ItwouldallowtheServiceProviderstolinkdifferent transactionsofthesameusersandbuildaprofile.Thiswouldnotbepossible withPrivacy-ABCsastheusersareabletoproduceunlinkabletokensfromtheir credentialsforeachtransaction.Inourexamplescenarios,apupilcouldusethe sameCredSchooltomakepresentationsabouttheirschoolnamewhenappearing underdifferentaliasesinthesystemandensurethatthiswouldnotintroduce anylinkabilitybetweentheiraliases.

5.4BlindTransferofAttributes

Let’sintroduceanexamplescenariofromtheABC4TrustPatraspilottobetter elaborateonthefeatureofblindtransferofattributes.Toencouragethepilot participantstocontinuetothelaststep,weannouncedatombolatotakeplace attheendofthetrialforthosewhosubmittedtheirevaluationofthecourse.The approachwastoissuetothestudentsaTombolaCredentialaftersubmissionof theirevaluation.However,thenewcredentialhadtocontainthematriculation numberofthestudent.Thislookschallengingasthestudentswerenotidentified wheninteractingwiththeportal.

AdvancedcredentialissuancetechniquesofPrivacy-ABCssupportafeature called“carried-overattribute”thatallowsanissuertoissueacredentialcontaininganattributevaluetransferredfromanothercredentialthattheuserholds, withoutlearningtheattributevalue.Therefore,inthePatrastrial,aftersubmittingtheevaluationform,theTombolaCredentialIssuercouldissuecredentials

totheusersandtransferthematriculationnumberfromtheirUniversityCredentialintoitwithoutgettingtoknowwhatthematriculationnumberis.

5.5RecoveringtheIdentityviaInspection

Onthefirstlook,theInspectionfeatureofPrivacy-ABCsmaybemisinterpreted asabackdoortotheprovidedanonymity.Thusexplainingandusingthisconcept anditsprocessesrequiresextracare.Thefirstimportantpointtomentionabout theInspectionisthatitwouldnotbepossiblealways,meaningthatbefore anybodywouldbeabletorecovertheidentityoftheuserbehindatransaction, theusershouldhavegoneintosomeagreementsanddeliveredextrainformation thatwouldmaketheInspectiontechnicallypossible.

WhenrequestingaccesstoaresourceprotectedbyInspection,theuserswould getinformedaboutthetermsandconditions(calledInspectionGrounds).If theuseracceptstheagreement,someadditionalinformation,suchasaunique identifierinthedomain,mustbe“verifiably”encryptedunderthepublickeyofa trustedthirdparty,calledInspector,andhastobeembeddedinthepresentation tokendeliveredtotheServiceProvider.Incaseofamisuse,theServiceProvider hasthepossibilitytoforwardthistokentotheInspectoralongwithanevidence fortheviolationoftheagreements.TheInspectorisresponsibleforinvestigating thecaseandcheckingwhethertheclaimofviolationbytheServiceProvider holds.Uponconfirmation,theInspectorcoulddecryptthetokenandrecover theidentifier.

Inspectionismainlyusedtoachieveaccountability.Forinstance,inthe S¨oderhamnpilot,theschoolislegallyresponsibleforeveryinfrastructureitprovidestothepupilsanditmustbeabletodealwithanycasethatintroduces threatstothepupils,suchasmobbing.Therefore,aprocesswasdesignedtoallow thepupilsreportinappropriatecontentsinthediscussionforum.Ifaforumis protectedbyInspection,the“InspectionBoard”,comprisingoftheschoolprincipal,someteachersandrepresentativesofthepupils,receivesthecasetojudge. Ifthecontentisagainstthetermsofuse,theysendthecorrespondingtokento theInspectortorecovertheuniqueidentifierofthepupil.

Inspectioncanbehelpfulinothertypesofscenariosaswell.Forexample, inanonlinepaymentprocess,thecreditcardnumberofthecustomercanbe deliveredinaninspectabletokenencryptedunderthepublickeyofthebank.In thisway,theonlineshopcanensurethatthecustomerisprovidingavalidcredit cardnumberwithoutactuallyseeingit.Theshopcanforwardthistothebankto performthecorrespondingtransferofcredit.Asimilarscenarioisimplemented intheABC4Trust“HotelBooking”demo5 . AnotherexampleforadifferentusageofInspectionwasdemonstratedinthe Patraspilot.Aswementionedearlier,thestudentswouldreceiveaTombola Credentialcontainingtheirmatriculationnumberaftersubmittingtheirevaluationforms.Usingthiscredentialtheycouldparticipateinatombola.However, thiscouldhavecausedthethreattoidentifywhoeversubmittedanevaluation

5 https://abc4trust.eu/demo/hotelbooking

ofthecourse.Tomaketheprocessprivacy-friendlythetombolasystemrequired theparticipantstodisclosetheirmatriculationnumberinaninspectableform andnotincleartext.Intheend,theInspectorcouldextracttheidentityofthe winneronlyandtheotherstudentscouldstayunknowntothesystem.

5.6SecuringPrivacy-ABCs

Atypicalmisusecaseiswhentheuserssharetheircredentialsinordertoletthe othersbenefitfromtheresourcesthattheynormallydonothavethenecessary credentialstoaccess.Privacy-ABCstrytoovercomethisproblembyofferingthe “key-binding”feature,whichessentiallybindsacredentialtothesecretkeyof theuser.Thus,whentheuserswanttolendtheircredentials,thehavetogive outtheirsecretkeyaswell.InaPrivacy-ABCsystem,aServiceProvidercan requireacombinationofcredentials(e.g.acreditcardtogetherwithapassport) forapresentationanditcanenforcethatbothcredentialsmustbeboundtothe “samesecretkey”.The“samekeyas”policycanbeappliedonpseudonymsas well,meaningthatapresentationpolicycanaskforacredentialthatisbound tothesamesecretkeyastheoneusedtogenerateapseudonym.

Usingsmartcardsasthekey/credentialstorageimprovessecurityandportabilityofPrivacy-ABCs.Onecouldrelyonthetamper-resistanceofsmartcards andenhancethesecurityviaon-boardcomputationoftheoperationsrequiring thesecretkey.Inthisway,thesecretkeyneverhastoleavethecardandstays protectedaslongasthesmartcardisnottamperedwith.ABC4Trustalsobenefitedfromsmartcardsinitsbothpilotsandreleaseditssmartcardfirmware onGithub6 tobepubliclyavailable.

6ABC4TrustLayeredArchitecture

TheABC4TrustarchitecturehasbeendesignedtodecomposefutureimplementationsofPrivacy-ABCtechnologiesintosetsofmodulesandspecifythe abstractfunctionalityofthesecomponentsinsuchawaythattheyareindependentfromalgorithmsorcryptographiccomponentsusedunderneath.The functionaldecompositionforeseespossiblearchitecturalextensionstoadditional functionalmodulesthatmaybedesirableandfeasibleusingfuturePrivacy-ABC technologiesorextensionsofexistingones.

TheinterchangeabilityofPrivacy-ABCtechniquesintheABC4Trustframeworkistheoutcomeofitslayeredarchitecturedesign.Figure 3 depictspartof thehighlevelABC4Trustarchitecturewheretwoofthemainactors,namely UserandVerifier,interactinatypicalservicerequestscenario.Thecoreofthe architectureiscalledABCE(ABCEngine)layer;itprovidesthenecessaryAPIs totheapplicationlayerresidingonthetopandutilizestheinterfacesoffered bythebottomlayercalledCE(CryptoEngine).Tocompletethepicturean XML-basedlanguageframeworkhasbeendesignedsothatABCEpeersfrom 6 https://github.com/p2abcengine/

Fig.3. ABC4Trustlayerdarchitecture,User-Verifierinteraction

differententitiesofthesystem,e.g.theUserandtheVerifier,cancommunicate inatechnology-agnosticmanner.Puttingallthepiecestogether,theapplication layerfollowsthecorrespondingstepsdefinedintheprotocolspecification[10], callstheappropriateABCEAPIs,andexchangesmessageswiththeotherparties.Furtherdowninthelayers,uponreceivinganAPIcall,theABCEperforms technology-agnosticoperations,suchasmatchingthegivenaccesspolicywith theuser’scredentials,interactingwiththeuserincaseitisneeded,andinvokingcryptoAPIsfromtheCEinordertoaccomplishcryptographicoperations. FinallythebottomlayerCEiswherethedifferentrealizationsofPrivacy-ABC technologiesappearandprovidetheirimplementationsfortherequiredfeatures.

ABC4Trustalsopresentsamodularmodelforthecryptolayer[10].Themain responsibilitiesoftheCryptographicEnginearetogeneratecryptographickey material,issuenewcredentialsbymeansofatwo-partyprotocol,generatethe cryptographicevidenceforaPresentationTokentoprovethatausersatisfies aPresentationPolicy,andverifysuchaproof.Thiscryptoarchitecturedefines thebuildingblocksofPrivacy-ABCtechnologiesandtheirinterfacesallowing implementationofadditionalfeaturesandextendingthefunctionalities.

7ConclusionandOutlook

ThispaperhasdocumentedthefeaturesandtheusageofPrivacy-ABCsfor privacy-respectingidentitymanagementconsideringtheinterestsoftherespectivestakeholders.Especiallyusersareenabledtomanagetheiridentitiesand IDs.TheexamplesinSect. 5 documentprivacy-friendlyapplicationsindifferent phasesofthebusinessesprocessofthetwotrials,thatABC4Trustconducted.

Insomecasesidentityinformationflowshavebeenchanneledandrestricted accordingtoheritageseparationsofdomains,e.g.whenenablinguserstomanage multiplepseudonymswithouthavingtomanagemultiplekeypairs.Insome casesnewtypesofchannelingandrestrictingofinformationflowswereenabled bythecryptographicfeaturesusedinPrivacy-ABCs,e.g.theblindtransferof attributes.

InanycaseitturnedoutthatthedefinitionofIdentityasa“setofattributes relatedtoanentity”asgloballystandardizedinthePart1oftheframeworkfor identitymanagement[6]developedbyISO/IECJTC1/SC27/WG5“Identity ManagementandPrivacyTechnologies”isusefulfordesigningprivacy-respecting identitymanagement.

Thereareopenchallengesintheareaofassurancetokenswhichareneeded tocarrythecredentialsandprocessthecalculationofpresentationtokens.Their designneedstofollowseveralprinciples

–Enablingtheassurancetokenholdertoinfluence

• thecharacterandthedegreeofidentificationand

• theamountofidentificationinformation;

–Enablingtheassurancetokentoprotectitselfbye.g.thefollowingfeatures:

• Abilitytoverifythecontrollerbye.g.anextrachanneltoavoid,thatan attackerimpersonatesacontroller,e.g.establishesanillegitimatesmart cardreadertoexploitinformationfromthetoken;

• Aportfolioofcommunicationmechanismsforredundancytoensure,that anycontroller,thatwishestoaccessthetoken,canbeverifiedviaan anadditionalcommunicationchannelbeyondthechannelofferedbythe controller;

• Sufficientaccesscontroltowardsrelevantdata,e.g.amagnetstripeor unprotectedchipwouldnotbeenough;

• Enoughprocessingpowerforcomplexoperationssuchascryptographic operations;

–Enablingcommunication

• betweenassurancetokenholderandassurancetoken,sothattheusercan control,whattheassurancetokenisprocessingandhowitisinteracting withotherentities.

Smartcardsareusuallyabletoprotectthemselves,buttheirlimiteduserinterfaces(evenconsideringasecurereader)makesitchallengingfortheuserto influencethecharacteranddegreeofidentificationandtheamountofidentificationinformation.Moreoverthecommunicationbetweentheuserasassurance tokenholderandtheassurancetokenislimited.

Smartphonesoffermanymoreoptionsfortheinteractionbetweenuserand assurancetoken,buttheyarenotasgoodtoprotectthemselvesandthekeys storedwithinthem.Reasonforthisarethecomplexityofnowadayssmartphones orsimilardevicesandthelackofoperatingsystemsecurity.Mobilesphoneswith morerobustprotectionareurgentlyneeded.Mobilephoneswithatrustedexecutionenvironment(TEE)areastepintotherightdirection,buttheTEEmust besecurelyconnectedtotheuserinterfacemakingsure,thatusers’confidential

16A.SabouriandK.Rannenberg

inputfortheTEEisnotmisdirectedandthatoutputfromtheTEEiscorrectly displayed.

References

1.X.509:informationtechnology-opensystemsinterconnection-thedirectory:public/keyandattributecertificateframeworks. http://www.itu.int/rec/T-REC-X. 509/en

2.Openidauthentication2.0,December2007. http://openid.net/specs/openidauthentication-2 0.html

3.AssertionsandprotocolsfortheOASISsecurityassertionmarkuplanguage(saml) v2.0,March2005. http://docs.oasis-open.org/security/saml/v2.0/saml-core-2. 0-os.pdf

4.Facebooklogin. https://developers.facebook.com/products/login/

5.Hardt,D.:Oauth2.0authorizationprotocol,October2012. http://tools.ietf.org/ html/rfc6749

6.ISO/IEC2011:ISO/IEC24760–1:2011informationtechnology-securitytechniques-aframeworkforidentitymanagement-part1:terminologyandconcepts, 1stedn.15–12-2011. http://standards.iso.org/ittf/PubliclyAvailableStandards/ index.html

7.Rannenberg,K.:Multilateralsecurity-aconceptandexamplesforbalancedsecurity.In:Proceedingsofthe9thACMNewSecurityParadigmsWorkshop2000 (NSPW2000),pp.151–162.ACM,NewYork(2000)[Online].Available: http:// doi.acm.org/10.1145/366173.366208

8.Brands,S.:RethinkingPublicKeyInfrastructuresandDigitalCertificates:BuildinginPrivacy.MITPress(2000)

9.Camenisch,J.,VanHerreweghen,E.:Designandimplementationoftheidemix anonymouscredentialsystem.In:Proceedingsofthe9thACMConferenceonComputerandCommunicationsSecurity,pp.21–30.ACM(2002)

10.Bichsel,P.,Camenisch,J.,Dubovitskaya,M.,Enderlein,R.R.,Krenn,S., Krontiris,I.,Lehmann,A.,Neven,G.,DamNielsen,J.,Paquin,C.,Preiss,F.-S., Rannenberg,K.,Sabouri,A.,Stausholm,M.:Architectureforattribute-based credentialtechnologies-finalversion.In:TheABC4TrustEUProject,DeliverableD2.2(2014).Availableat https://abc4trust.eu/download/Deliverable D2.2. pdf .Lastaccessedon08–11–2014

TowardsanEngineeringModel ofPrivacy-RelatedDecisions

DepartmentofIndustrialEngineering, TelAvivUniversity,TelAviv-Yafo,Israel jmeyer@tau.ac.il

Abstract. Peoplemakenumerousdecisionsthataffecttheirownorothers’ privacy,includingthedecisionstoengageincertainactivities,torevealand shareinformationortoallowaccesstoinformation.Thesedecisionsdependon propertiesoftheinformationtoberevealed,thesituationinwhichthedecision ismade,thepossiblerecipientsoftheinformation,andcharacteristicsofthe individualperson.Systemdesignshouldideallyprotectusersfromunwanted consequencesbyallowingthemtomakeinformeddecisions,attimesblocking users’ abilitytoperformcertainactions(e.g.,whentheuserisaminor).The developmentofalertingandblockingmechanismsshouldbebasedonpredictive modelsofuserbehavior,similartoengineeringmodelsinotherdomains. Thesemodelscanbeusedtoevaluatedifferentdesignalternativesandtoassess therequiredsystemspecifications.Predictivemodelsofprivacydecisionswill havetocombineelementsfromnormativedecisionmakingandfrombehavioral, descriptiveresearchondecisionmaking.Somemajorissuesinthedevelopment andvalidationofsuchmodelsarepresented.

Keywords: Privacy Decisionmaking Models Cognitiveengineering

1Introduction

Privacyhasbecomeamajorconcerninpeople’sinteractionwithtechnologies.The storingofvastamountsofinformationandthepossibleaccesstothisinformationby otherpeople,bygovernmentalagencies,orbycompaniesandotherorganizations exposepeopletothethreatofothersgaininginformationaboutthemonalmostall aspectsoftheirlifes.Thepeoplewhoaccesstheinformationareusuallyunknownto theindividual,mayusetheinformationagainsttheindividual’sinterest,andthe individualgenerallyhasnowaytoredresstheissue.

Atthesametime,peoplealsogainbenefitsfromrevealinginformation.Theyreceive personalizedservices,suchasadaptedproductofferingsonwebsites,theymayhave accesstolocation-relatedrecommendations,theycangetemergencysupportwhenthey areinanaccident(iftheyareconnectedtoasystemthatmonitorstheirstatusand location),etc.Therapidlyblooming fi eldofsocialnetworksisbasedentirelyonpeople’s willingness,andevendesire,tosharepersonalinformation.Thussharinginformation andhavingothersaccessone’sinformationarenotnecessarilybad,noraretheynecessarilygood.Rather,asisusuallythecase,theyhavebothpositiveandnegativesides.

© IFIPInternationalFederationforInformationProcessing2015 J.Camenischetal.(Eds.):PrivacyandIdentity2014,IFIPAICT457,pp.17–25,2015. DOI:10.1007/978-3-319-18621-4_2

1.1PrivacyDecisionMaking

Thenotionthatprovidingaccesstoone’spersonalinformationcanhaveadvantages anddisadvantagesforapersonhasbeenknownforalongtime.Itimpliesthatpeople maywanttoweightheadvantagesanddisadvantagesandchoosewhethertoreveal information.Thisideaiscentralinthedefinitionofprivacy,proposedbyWestin (1967),as “theclaimofindividuals,groupsorinstitutionstodetermineforthemselves when,how,andtowhatextentinformationaboutthemiscommunicatedtoothers.” He recognizesthedynamicnatureofthesechoicesbyalsostatingthat “… eachindividual iscontinuallyengagedinapersonaladjustmentprocessinwhichhebalancesthedesire forprivacywiththedesirefordisclosureandcommunication …”

Thusonecananalyzeaperson’sprivacyrelatedactionsastheresultofdecision processes.Theactivesharingofinformation,theengagementinactivitiesthatgenerate information,orthefailuretopreventprivateinformationfrombecomingpublic,canall beseenasresultsofdecisionprocesses.Accordingtoeconomicnormativemodelsof decisionmaking(suchastheExpectedUtilityModel),thedecisionsshouldbemade, basedontheexpectedoutcomeswheninformationisrevealedandwhenitisnot. However,forprivacydecisions,asfordecisionsinmostotherdomains,people’sactual decisionmakingdeviatesfromtheprescriptionsofclassiceconomicmodels(e.g., AcquistiandGrossklags 2005).Furthermore,privacy-relateddecisionsareinherently difficulttoanalyze,evenwithsimpleeconomicmodels,sincetheconsequences(costs andbenefits)occuratdifferentpointsinthefuture,theyoccurwithsome(largely unknown)probabilities,andtheyareinmostcasesnotdirectlytranslatableinto monetaryvalues.

Privacy-relateddecisionshaveavarietyofoutcomesthathaveverydifferent importanceandmeaningfordifferentpeople.Basically,therearethreemajorcategories ofoutcomes(seeTable 1):

Social.Privacy-relateddecisionscanaffecttherelationsapersonhaswithother people.Communicatingwithothers,by,forinstance,postingonsocialnetworks, canprovidevariousbenefits.Theseincludecommunicatingaboutaperson’s status,creatingandmanagingtheimpressionsothersmighthaveabouttheperson, maintainingrelationshipswithothers,etc.Theseactionsmayalsohavenegative consequences,suchasoffendingcertainpeople,orinformationreachingpeople whowerenotsupposedtoseeit(e.g.,thebossseeinganemployeeintoxicated).

Economic.Sharingofinformationmaybemotivatedbyeconomicbenefi tsaperson receiveswhenagreeingtosharetheinformation.Examplesarepeoplejoining customerloyaltyprograms,wheretheyreceiveminorbenefitsforagreeingtoreveal theiridentity(e.g.,swipetheircard)whenevertheyperformapurchase.Revealing informationmayalsohavenegativeeconomicimplications.Forinstance,ifan insurancecompanyobtainsinformationshowingthatapersonisatanincreasedrisk forsomechronicdisease,thecompanymayraisetheperson’sinsurancerates.

Functional.Sharingofinformationmayprovidefunctionalbenefits.Forinstance, onemustsharelocationinformationtoreceivelocation-dependentservicesor recommendations.Sharingone’sidentitywithawebsiteallowsthesitetocustomize theinformationtotheindividual’scharacteristics,etc.However,theshared

informationmayalsobemisused,ashappensinthemostextremecasewhenitis usedbyacriminal,forinstancetoperformidentitytheft.

Ideallypeopleshouldmakeprivacy-relateddecisionsafterconsideringallpossible consequences.Thisisobviouslyproblematic,anditisunrealistictoexpectthatpeople explicitlyevaluateandweigheachoftheconsequences(andtheremaybeverymany), theirprobability,andtheirutilityinsomecommonmeasure.However,itmaybe possibletopredicttosomeextentwhichpossibleconsequencespeopleconsider, dependingonthepriorinformationtheyhaveandthedisplayofrelevantinformation bythesystem.

Table1. Sometypesofcostsandbenefitsrelatedtoprivacy

BenefitsDangersandcosts

SocialCommunicatewithothers,impression management,maintainrelationship

Unintendedconsequencesof informationreachingpeople

EconomicIncentivesfromsharinginformationPossiblenegativeeffects (increasedinsurancerates, etc.)

FunctionalImprovedserviceswhenfunctionsare shared(locationbasedrecommendations)

2PrivacyEngineering

Possiblemisuseofinformation (identitytheft,etc.)

Thedesignofsystemsthattakeprivacyintoaccounthastodealwithnumerousaspects ofprivacy,includingtheencryptionofinformation,theprotectionofinformationfrom unwantedaccess,thelimitationofinformationcollection,etc.Eventuallytheseboil downtotechnicaldecisionsmadebythepeoplewhodevelop,deployandmaintain systems.Thesearepartoftheengineeringofsystems,andhencetheengineeringof privacymaybearelevantterm.SpiekermanandCranor(2009)publishedananalysisof thedevelopmentofprivacy-sensitivesystems,withthetitle “engineeringprivacy”.They describetwoapproachesintheengineeringofprivacy.One,whichtheyname “privacy byarchitecture”,isthepreventionofprivacyviolationsbydesigningthesystemsothat thedatacollectionwillbeminimalorprivacyviolationswillideallybeimpossible.The otherapproach, “privacybypolicy”,dealswithcasesinwhichthepossibilityofprivacy violationsstillexists.Thensystemdesignersneedtoinformusersaboutpossibleprivacy risksandmustleaveusersthechoicewhethertoexposethemselvestosuchrisksornot (the “noticeandchoice” approach).

Gurses(2014)pointsoutthatbuildingsystemsthatcopeappropriatelywiththe plethoraoflegalandsocietalaspectsofprivacyisa “bewilderinglycomplex” task.She describesthreemajorapproachesinprivacyresearchincomputerscience,whichcan formthebasisoftheengineeringofprivacy:(1)Privacyasconfidentiality,which meanslimitingtheamountofinformationcollectedandthepossibilitythatinformation canberevealedtoothers;(2)privacyascontrol,whichmeanscreatingmechanismsthat allowpeopletocontrolthecollectionanduseofdataaboutthem;and(3)privacyas

Another random document with no related content on Scribd:

Garner Ted Armstrong. Program 501. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 5Nov73; MP24999.

MP25000.

Garner Ted Armstrong. Program 428. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 10Apr73; MP25000.

MP25001.

Garner Ted Armstrong. Program 444. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 2May73; MP25001.

MP25002.

Garner Ted Armstrong. Program 537. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 14Jan74 (in notice: 1973); MP25002.

MP25003.

Garner Ted Armstrong. Program 516. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 7Dec73; MP25003.

MP25004.

Garner Ted Armstrong. Program 533. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 28Dec73; MP25004.

MP25005.

Garner Ted Armstrong. Program 528. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 19Dec73; MP25005.

MP25006.

Garner Ted Armstrong. Program 424. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 5Apr73; MP25006.

MP25007.

Garner Ted Armstrong. Program 426. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 8Apr73; MP25007.

MP25008.

Garner Ted Armstrong. Program 530. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 28Dec73; MP25008.

MP25009.

Garner Ted Armstrong. Program 427. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 9Apr73; MP25009.

MP25010.

Garner Ted Armstrong. Program 505. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 4Nov73; MP25010.

MP25011.

Garner Ted Armstrong. Program 457. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 14May73; MP25011.

MP25012.

Garner Ted Armstrong. Program 425. Ambassador College. 29 min., sd., color, videotape (1/2 inch) © Ambassador College; 6Apr73; MP25012.

MP25013.

Controlling absenteeism. 32 min., sd., color, 16 mm. (The Gellerman effective supervision film series) © BNA Communications, Inc.; 14Mar74; MP25013.

MP25014.

Life in a drop of water. A Coronet film. 10 min., sd., color, 16 mm. Prev. pub. 7Jul47, M2571. NM: some film footage & narration. © Coronet Instructional Media, a division of Esquire, Inc.; 11Aug73; MP25014.

MP25015.

Fun with speech sounds. 2nd. ed. 15 min., sd., color, 16 mm. © Coronet Instructional Media, a division of Esquire, Inc.; 31May73; MP25015.

MP25016.

Maps show our earth. A Coronet film. 10 min., sd., color, 16 mm. © Coronet Instructional Materials, a division of Esquire, Inc.; 6Jul73; MP25016.

MP25017.

Workers depend on each other. A Coronet film. 11 min., sd., color, 16 mm. © Coronet Instructional Media, a division of Esquire, Inc.; 28Jun73; MP25017.

MP25018.

V S A M concepts and access method services usage. IBM Corporation. 70 min., b&w, videotape. (IBM independent study

program) © International Business Machines Corporation, accepted alternative designation: IBM Corporation; 14Jan74 (in notice: 1973); MP25018.

MP25019.

A L C coding techniques for virtual storage. IBM Corporation. 28 min., b&w, videotape. (IBM independent study program) © International Business Machines Corporation, accepted alternative designation: IBM Corporation; 14Jan74 (in notice: 1973); MP25019.

MP25020.

Louie gets his licks. Instructional Material Systems. 13 min., sd., color, 16 mm. © IMS a. a. d. o. Instructional Material Systems; 9Aug73; MP25020.

MP25021.

Compact truck features and comparison. 17 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 2Jan74 (in notice: 1973); MP25021.

MP25022.

Chrysler Newport versus Buick LeSabre and Olds 88. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 17Jan74 (in notice: 1973); MP25022.

MP25023.

1974 cleaner air system. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 18Dec73; MP25023.

MP25024.

Sell from strength. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 19Dec73; MP25024.

MP25025.

“Two hats,” the 1974 Dodge pickup. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 19Dec73; MP25025.

MP25026.

Satellite Chevelle and Torino comparison. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 3Dec73; MP25026.

MP25027.

Monaco, Impala, Galaxie 500 comparison. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 19Dec73; MP25027.

MP25028.

Monaco and Fury versus Impala and Galaxie. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 19Dec73; MP25028.

MP25029.

Dart / Nova / Maverick comparison. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 3Dec73; MP25029.

MP25030.

1974 Chrysler and Plymouth station wagons. 9 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 19Dec73; MP25030.

MP25031.

1974 Dodge station wagons. 9 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 19Dec73; MP25031.

MP25032.

Satellite and Charger / Coronet versus Chevelle and Torino. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 12Dec73; MP25032.

MP25033.

Charger / Coronet / Chevelle and Torino comparison. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 3Dec73; MP25033.

MP25034.

Fury / Impala / Galaxie 500 comparison. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 3Dec73; MP25034.

MP25035.

Dart and Duster comparison with Nova and Maverick. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 26Dec73; MP25035.

MP25036.

Duster / Valiant / Nova / Maverick comparison. 18 min., sd., color, Super 8 mm. Appl. au.: Ross Roy, Inc. © Chrysler Corporation; 3Dec73; MP25036.

MP25037.

VD attack plan. Walt Disney Productions. 16 min., sd., color, 16 mm. © Walt Disney Productions; 27Feb73 (in notice: 1972); MP25037.

MP25038.

I’m no fool with electricity. Walt Disney Productions. 8 min., sd., color, 16 mm. © Walt Disney Productions; 26Oct73; MP25038.

MP25039.

Geothermal power. 15 min., sd., color, 16 mm. Appl. au.: Howard J. Lindenmeyer. © Howlin Cinema Productions; 1Feb74; MP25039. MP25040.

Kiel Olympiad. Offshore Productions. Produced in cooperation with the United States International Sailing Association, Yacht Racing Magazine & Yachting Magazine. 56 min., sd., color, 16 mm. Appl. au.: Dick Enersen & Laszlo Pal. © Enersen/Pal Enterprises; 22Feb73; MP25040.

MP25041.

April showers. 30 sec., sd., color, 16 mm. Appl. au.: William Esty Company, Inc. © Colgate Palmolive Company; 7Oct73; MP25041.

MP25042.

Deep water rescue breathing. A Pierce production. 10 min., sd., color, 16 mm. Appl. au.: Albert L. Pierce. © Albert L. Pierce; 19Sep73; MP25042.

MP25043.

Teacher self appraisal observation system: a technique for improving instruction. Educational Innovators Press. 17 min., sd., b&w, videotape (1/2 inch) (Teacher self appraisal, packet V1) Add. ti.: Observation system—improving instruction. © Educational Innovators Press, a division of Multimedia Associates, Inc.; 15May73; MP25043.

MP25044.

Coding classroom introduction situations utilizing the teacher self appraisal observation system. Educational Innovators Press. 22 min., sd., b&w, videotape (1/2 inch) (Teacher self appraisal, packet V2) © Educational Innovators Press, a division of Multimedia Associates, Inc.; 15May73; MP25044.

MP25045.

Coding classroom discussion situations utilizing the teacher self appraisal observation system. Educational Innovators Press. 20 min., sd., b&w, videotape (1/2 inch) (Teacher self appraisal, packet V3) © Educational Innovators Press, a division of Multimedia Associates, Inc.; 15May73; MP25045.

MP25046.

Coding classroom review situations utilizing the teacher self appraisal observation system. Educational Innovators Press. 18 min., sd., b&w, videotape (1/2 inch) (Teacher self appraisal, packet V4) © Educational Innovators Press, a division of Multimedia Associates, Inc.; 15May73; MP25046.

MP25047.

Coding classroom activities situations utilizing the teacher self appraisal observation system. Educational Innovators Press. 20 min., sd., b&w, videotape (1/2 inch) (Teacher self appraisal, packet V5) © Educational Innovators Press, a division of Multimedia Associates, Inc.; 15May73; MP25047.

MP25048.

Establishing observer reliability with the teacher self appraisal observation system. Educational Innovators Press. 28 min., sd., b&w, videotape (1/2 inch) (Teacher self appraisal, packet V6) © Educational Innovators Press, a division of Multimedia Associates, Inc.; 15May73; MP25048.

MP25049.

Now your injector. GSRX3053. 30 sec., sd., color, 16 mm. Appl. au.: J. Walter Thompson Company. © Gillette a. a. d. o. the Gillette Company; 18Oct73; MP25049.

MP25050.

Best shave ahead. GSRX3013. 30 sec., sd., color, 16 mm. Appl. au.: J. Walter Thompson Company. © Gillette a. a. d. o. the Gillette Company; 18Oct73; MP25050.

MP25051.

The Fundamental theorem. 4 min., si., color, Super 8 mm. (Calculus in motion) Appl. au.: Bruce Cornwell & Katherine Cornwell, with editorial assistance by Duane W. Bailey. © Houghton Mifflin Company; 4May73; MP25051.

MP25052.

Derivatives. 4 min., si., color, Super 8 mm. (Calculus in motion) Appl. au.: Bruce Cornwell & Katherine Cornwell, with editorial assistance by Duane W. Bailey. © Houghton Mifflin Company; 27Jun73; MP25052.

MP25053.

Taylor polynomials. 4 min., si., color, Super 8 mm. (Calculus in motion) Appl. au.: Bruce Cornwell & Katherine Cornwell, with editorial assistance by Duane W. Bailey. © Houghton Mifflin Company; 31Jul73; MP25053.

MP25054.

Concavity and points of inflection. 4 min., si., color, Super 8 mm. (Calculus in motion) Appl. au.: Bruce Cornwell & Katherine Cornwell, with editorial assistance by Duane W. Bailey. © Houghton Mifflin Company; 31Jul73; MP25054.

MP25055.

Rolle’s theorem and the mean value theorem. 4 min., si., color, Super 8 mm. (Calculus in motion) Appl. au.: Bruce Cornwell & Katherine Cornwell, with editorial assistance by Duane W. Bailey. © Houghton Mifflin Company; 6Jul73; MP25055.

MP25056.

Limits. 4 min., si., color, Super 8 mm. (Calculus in motion) Appl. au.: Bruce Cornwell & Katherine Cornwell, with editorial assistance by Duane W. Bailey. © Houghton Mifflin Company; 27Jun73; MP25056.

MP25057.

The Definite integral. 4 min., si., color, Super 8 mm. (Calculus in motion) Appl. au.: Bruce Cornwell & Katherine Cornwell, with editorial assistance by Duane W. Bailey. © Houghton Mifflin Company; 4May73; MP25057.

MP25058.

The Wordworks 1. Houghton Mifflin Company. 11 min., sd., color, 16 mm. © Houghton Mifflin Company; 31Dec73; MP25058.

MP25059.

The Wordworks 2. Houghton Mifflin Company. 11 min., sd., color, 16 mm. © Houghton Mifflin Company; 31Dec73; MP25059.

MP25060.

The Wordworks 3. Houghton Mifflin Company. 11 min., sd., color, 16 mm. © Houghton Mifflin Company; 31Dec73; MP25060.

MP25061.

The Wordworks 4. Houghton Mifflin Company. 11 min., sd., color, 16 mm. © Houghton Mifflin Company; 31Dec73; MP25061.

MP25062.

Choice not chance — career development in New Jersey. A film by Videgraphe. 26 min., sd., color, 16 mm. Appl. au.: Robert J. Phillips. © Videgraphe Corporation; 12Dec73; MP25062.

MP25063.

Bicycle safely. 12 min., sd., color, 16 mm. © Fiesta Films; 28Feb74; MP25063.

MP25064.

Poetry for fun — dares and dreams. A Centron production. 13 min., sd., color, 16 mm. © Centron Corporation, Inc.; 13Mar74; MP25064.

MP25065.

Gettysburg — 1863. A Whitefield production. 19 min., sd., color, 16 mm. © Centron Corporation, Inc.; 13Mar74; MP25065.

MP25066.

Laudate. 6 min., sd., b&w, 16 mm. Based on Igor Stravinsky’s Symphony of psalms. Appl. au.: Nicholas Frangakis. © Nicholas Frangakis; 1Mar74 (in notice: 1973); MP25066.

MP25067.

Repairs to air conditioning condensers. 27 min., sd., color, 16 mm. © Motors Insurance Corporation; 28Feb74 (in notice: 1973); MP25067.

MP25068.

It’s your move, sergeant. Woroner Films. 24 min., sd., color, 16 mm. (Decisions) © Woroner Films, Inc.; 10Jan74 (in notice: 1973); MP25068.

MP25069.

The Language of medicine. Introd. 12 min., sd., color, videotape (3/4 inch) in cassette. Appl. au.: Wallace J. Vnuk. © Walfran Research and Educational Fund; 14Dec73; MP25069.

MP25070.

The Language of medicine. Lesson no. 1. 10 min., sd., color, videotape (3/4 inch) in cassette. Appl. au.: Wallace J. Vnuk. © Walfran Research and Educational Fund; 14Dec73; MP25070.

MP25071.

The Language of medicine. Lesson no. 2. 7 min., sd., color, videotape (3/4 inch) in cassette. Appl. au.: Wallace J. Vnuk. © Walfran Research and Educational Fund; 14Dec73; MP25071.

MP25072.

The Language of medicine. Lesson no. 3. 15 min., sd., color, videotape (3/4 inch) in cassette. Appl. au.: Wallace J. Vnuk. © Walfran Research and Educational Fund; 14Dec73; MP25072.

MP25073.

The Language of medicine. Lesson no. 4. 14 min., sd., color, videotape (3/4 inch) in cassette. Appl. au.: Wallace J. Vnuk. © Walfran Research and Educational Fund; 14Dec73; MP25073.

MP25074.

The Language of medicine. Lesson no. 5. 10 min., sd., color, videotape (3/4 inch) in cassette. Appl. au.: Wallace J. Vnuk. © Walfran Research and Educational Fund; 14Dec73; MP25074.

MP25075.

The Language of medicine. Lesson no. 6. 17 min., sd., color, videotape (3/4 inch) in cassette. Appl. au.: Wallace J. Vnuk. © Walfran Research and Educational Fund; 14Dec73; MP25075.

MP25076.

Feelings. United Methodist Communications. 29 min., videotape (3/4 inch) in cassette. (Learning to live) © Trafco, Inc.; 15Jan74 (in notice: 1973); MP25076.

MP25077.

Ego states. United Methodist Communications. 29 min., videotape (3/4 inch) in cassette. (Learning to live) © Trafco, Inc.; 15Jan74 (in notice: 1973); MP25077.

MP25078.

Games. United Methodist Communications. 29 min., videotape (3/4 inch) in cassette. (Learning to live) © Trafco, Inc.; 15Jan74 (in notice: 1973); MP25078.

MP25079.

Time structures. United Methodist Communications. 29 min., videotape (3/4 inch) in cassette. (Learning to live) © Trafco, Inc.; 15Jan74 (in notice: 1973); MP25079.

MP25080.

Scripts “B.” United Methodist Communications. 29 min., videotape (3/4 inch) in cassette. (Learning to live) © Trafco, Inc.; 15Jan74 (in notice: 1973); MP25080.

MP25081.

Scripts “A.” United Methodist Communications. 29 min., videotape (3/4 inch) in cassette. (Learning to live) © Trafco, Inc.; 15Jan74 (in notice: 1973); MP25081.

MP25082.

Strokes. United Methodist Communications. 29 min., videotape (3/4 inch) in cassette. (Learning to live) © Trafco, Inc.; 15Jan74 (in notice: 1973); MP25082.

MP25083.

Transactions. United Methodist Communications. 29 min., videotape (3/4 inch) in cassette. (Learning to live) © Trafco, Inc.; 15Jan74 (in notice: 1973); MP25083.

MP25084.

A Conversation with President Tito. A production of CBS News. 30 min., sd., color, 16 mm. (CBS News special report) © Columbia Broadcasting System, Inc.; 25Oct71; MP25084.

MP25085.

Search for the Goddess of Love. CBS News. Produced in association with the Smithsonian Institution. 60 min., sd., color, 16 mm. (Smithsonian adventure) © Columbia Broadcasting System, Inc.; 13Jun71; MP25085.

MP25086.

The Court and a free press. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special report) © Columbia Broadcasting System, Inc.; 1Jul71; MP25086.

MP25087.

Louis Armstrong: 1900–1971. A production of CBS News. 60 min., sd., color, 16 mm. (CBS News special) © Columbia Broadcasting

System, Inc.; 9Jul71; MP25087.

MP25088.

The Year 1200. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 9Aug71 (in notice: 1970); MP25088.

MP25089.

The Chappaquiddick report. A production of CBS News. 30 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 29Apr70; MP25089.

MP25090.

Where we stand in Cambodia. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 3May70; MP25090.

MP25091.

The Catholic dilemma. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 5Oct70; MP25091.

MP25092.

The Court martial of William Calley. A production of CBS News. 30 min., sd., b&w, 16 mm. (CBS News special report) © Columbia Broadcasting System, Inc.; 29Mar71; MP25092.

MP25093.

The Economy: a new way to go. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special report) © Columbia Broadcasting System, Inc.; 15Aug71; MP25093.

MP25094.

Reston on China: a conversation with Eric Sevareid. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special report) © Columbia Broadcasting System., Inc.; 30Aug71; MP25094.

MP25095.

The World of Charlie Company. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special report) © Columbia Broadcasting System, Inc.; 13Jul70; MP25095.

MP25096.

Voices from the Russian underground. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special report) © Columbia Broadcasting System, Inc.; 27Jul70; MP25096.

MP25097.

Blue Christmas? An inquiry into the state of the economy. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special report) © Columbia Broadcasting System, Inc.; 1Dec70; MP25097.

MP25098.

Is mercury a menace? A production of CBS News. 30 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 11Jan71; MP25098.

MP25099.

Southern exposures. A production of CBS News. 30 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 3May71; MP25099.

MP25100.

On the road with Charles Kuralt. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 6Sep71; MP25100.

MP25101.

Sixty minutes. Vol. 3, no. 12. A production of CBS News. 60 min., sd., b&w, 16 mm. © Columbia Broadcasting System, Inc.; 2Mar71; MP25101.

MP25102.

Sixty minutes. Vol. 4, no. 8. A production of CBS News. 60 min., sd., b&w, 16 mm. © Columbia Broadcasting System, Inc.; 25Nov71; MP25102.

MP25103.

Sixty minutes. Vol. 4, no. 9. A production of CBS News. 60 min., sd., b&w, 16 mm. © Columbia Broadcasting System, Inc.; 28Nov71; MP25103.

MP25104.

Kids! 53 things to know about health, sex and growing up. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 26Jan71; MP25104.

MP25105.

New voices in the South. A production of CBS News. 30 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 8Mar71; MP25105.

MP25106.

Reischauer on Asia. A production of CBS News. 30 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 6Jul71; MP25106.

MP25107.

The Correspondents report. Pt. 2: America and the world. A production of CBS News. 60 min., sd., b&w, 16 mm. (CBS News special) © Columbia Broadcasting System, Inc.; 30Dec71; MP25107.

MP25108.

Pandora’s box. Perspective Films. 8 min., sd., color, 16 mm. © Perspective Films, a division of Esquire, Inc.; 22Jan74; MP25108.

MP25109.

Kyoto: exploring with Larry. A Coronet film. 10 min., sd., color, 16 mm. © Coronet Instructional Media, a division of Esquire, Inc.; 14Jan74; MP25109.

MP25110.

Hong Kong: wandering with Rick. A Coronet film. 10 min., sd., color, 16 mm. © Coronet Instructional Media, a division of Esquire, Inc.; 15Jan74; MP25110.

MP25111.

Ball game. A film by Evelyn Marienberg. 1 min., sd., color, 16 mm. © Evelyn Marienberg; 15Mar74; MP25111.

MP25112.

To a babysitter. An Alfred Higgins production. 2nd ed. 17 min., sd., color, 16 mm. © Alfred Higgins Productions, Inc.; 14Mar74; MP25112.

MP25113.

Elementary natural science — songbirds. Centron Educational Films. Produced in collaboration with Centron Corporation. 13 min., sd., color, 16 mm. © Centron Corporation, Inc.; 15Mar74; MP25113.

MP25114.

Tornado. 6 min., si., color, Super 8 mm. Appl. au.: Donald D. Patterson. Prev. reg. 17Dec73, MU8857. © Donald D. Patterson; 20Dec73; MP25114.

MP25115.

Feeding. Sutherland Learning Associates. 10 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25115.

MP25116.

Growth and development, toilet training. Sutherland Learning Associates. 9 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25116.

MP25117.

Troubles in the digestive tract. Sutherland Learning Associates. 10 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25117.

MP25118.

Respiratory problems. Sutherland Learning Associates. 9 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25118.

MP25119.

Medication and treatment, your child’s eyes. Sutherland Learning Associates. 8 min., sd., color, Super 8 mm. (Rocom Parentaid film

system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25119.

MP25120.

Temperature. Sutherland Learning Associates. 5 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25120.

MP25121.

Allergy. Sutherland Learning Associates. 8 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25121.

MP25122.

Accident prevention. Sutherland Learning Associates. 10 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70, MP22907. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25122.

MP25123.

The Fussy baby. Sutherland Learning Associates. 8 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25123.

MP25124.

Immunizations. Sutherland Learning Associates. 6 min., sd., color, Super 8 mm. (Rocom Parentaid film system, parent counseling child care) Prev. pub. 29Oct70. NM: editorial revision. © Hoffmann LaRoche, Inc.; 29Jun73; MP25124.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.