Steve Kenny Presented by: Larry Korba Design Embedded Privacy Risk Management Institute for Information Technology 14 th CACR, November 7,8, 2002.

Slides:



Advertisements
Similar presentations
ICT research priorities and recommendations for strategy development in the WBC Ulrike Kunze / PT-DLR, Germany Consultation session on recommendations.
Advertisements

OMV Ontology Metadata Vocabulary April 10, 2008 Peter Haase.
A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI,
Networking of Legal Information Websites in Europe - experiences and challenges Aki Hietanen Ministry of Justice, Finland.
A Model of eHealth Interoperability Craig Kuziemsky, Telfer School of Mgmt, University of Ottawa. James Williams, Community Care Information Management.
From Privacy Protection to Interface Design: Implementing Information Privacy in Human-Computer Interactions Andrew S. Patrick National Research Council.
FIA Budapest 18 May 2011 The socio-economic impacts of the Future Internet FIA Budapest 18 May 2011.
Security Prospects through Cloud Computing by Adopting Multiple Clouds Meiko Jensen, Jorg Schwenk Jens-Matthias Bohli, Nils Gruschka Luigi Lo Iacono Presented.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Challenges in Making E-Privacy Real Larry Korba Institute for Information Technology National Research Council of Canada Panel Presentation, 6 th Annual.
Supporting Privacy in E-learning with Semantic Streams Lori Kettel, Christopher Brooks, Jim Greer ARIES Laboratory Advanced Research in Intelligent Educational.
Ontologies and the Semantic Web by Ian Horrocks presented by Thomas Packer 1.
Bay Zero  Jessie Hey  Steve Harris  Phillip Turner  Pietro Panzarasa  Kate Dickens  Srinandan Dasmahapatra  Backgrounds Include:  Marine.
Protecting Privacy in Software Agents: Lessons from the PISA Project Andrew Patrick National Research Council of Canada
EnMAS emergent and normative behaviour in Multi-Agent Systems André Meyer, TNO TPD
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
SEC835 Database and Web application security Information Security Architecture.
The Sevilla process for supporting the implementation of the IPPC Directive Michael Parth Tallinn – Estonia 27 – 28 March 2008.
Man-Sze Li IC Focus Enterprise Interoperability Research Roadmap SME aspects.
March 26, 2003The Navigo Project Hans C. Masing, The University of Michigan Lance D. Speelmon, Indiana University An IMS and OKI Compliant Open Source.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
Brian Matthews, DeFINE, Pisa 26/11/02 Trust and the Semantic Web Brian Matthews, Business & Information Technology Dept, CLRC
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
Web2Agent project IKTA4-121/2001 Integrating Web Resources into the Agentcities Multi-agent initiative of the EU Presenter: László Zsolt Varga Computer.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Collaboration with IEEE P2413 Source: Omar Elloumi, TP Chair WG: TP Meeting: TP17.
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Undertakings for collective investment in transferable securities (UCITS) Worldbank Global Development Learning Network The Advanced Program in Accounting.
Web based Hydrology and Water Resources Information System for India
Creating a European entity Management Architecture for eGovernment CUB - corvinus.hu Id Réka Vas
Semantic based P2P System for local e-Government Fernando Ortiz-Rodriguez 1, Raúl Palma de León 2 and Boris Villazón-Terrazas 2 1 1Universidad Tamaulipeca.
Grid Computing & Semantic Web. Grid Computing Proposed with the idea of electric power grid; Aims at integrating large-scale (global scale) computing.
The world of autonomous reconfigurable systems Intelligent Interactive Distributed Systems Group Vrije Universiteit Amsterdam /
Privacy and Security Solutions For Interoperable Health Information Exchange Presented by Linda Dimitropoulos, PhD RTI International Presented at AHRQ.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Challenge 6: Mobility, Environmental sustainability and energy efficiency Includes as driving objective: “Sustainable growth and environmental sustainability”
Semantically Federating Multi- Agent Organizations R. Cenk ERDUR, Oğuz DİKENELLİ, İnanç SEYLAN, Önder GÜRCAN. AEGEANT-S Group, Ege University, Dept. of.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
1 PARCC Data Privacy & Security Policy December 2013.
Internet of Things in Industries
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Rafael Rodríguez Clemente. Coordinator* *Estación Biológica de Doñana, CSIC. Sevilla (Spain) MoCo Meeting, Casablanca (Morocco)
Teaching PbD at legal ManaMa students Dr. E. J. Kindt IPEN 2015.
UNCLASSIFIED Service Oriented Architecture, Information Sharing and the FEA DRM 23 January 2006 Bryan Aucoin DNI CIO Chief Architect
Chapter 4 – Requirements Engineering Lecture 1 The hardest part of the software task is arriving at a complete and consistent specification, and much of.
Internet 2 and DoDHE: Research Issues From The iSchool Perspective Mike Eisenberg Dean and Professor The Information School University of Washington, Oct.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
1 Revising the Data Protection Directive Reinventing Data Protection? Lilian Mitrou, Ass. Professor University of the Aegean 4 th International Seminar.
1 Dr. Spyros Papastergiou, University of Piraeus (Greece)–Dept. of Informatics M. Zaharias Singular Logic (Greece) CYSM Risk Assessment Methodology.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
1 Dr David Coles Ethics and Science European Commission ACTIVITIES on ETHICS in The Science and Society Programme.
GDPR (General Data Protection Regulation)
ICT PSP 2011, 5th call, Pilot Type B, Objective: 2.4 eLearning
PowerTech 2017, Manchester| 19 June 2017
PRESENTATION OF MONTENEGRO
Architecture Components
PLUG-N-HARVEST ID: H2020-EU
The activity of Art. 29. Working Party György Halmos
Towards WISE as a distributed system
Dashboard eHealth services: actual mockup
The EDPS: competences and processing of personal data in EU funds
Hans Dufourmont Eurostat Unit E4 – Structural Funds
Hans Dufourmont Eurostat Unit E4 – Structural Funds
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Steve Kenny Presented by: Larry Korba Design Embedded Privacy Risk Management Institute for Information Technology 14 th CACR, November 7,8, 2002

Agenda Background Objectives Approach Conclusions

Caveats Not all of the ideas expressed here are my own… Ask all the questions you want, I may not be able to answer!

Background Privacy Incorporated Software Agent (PISA) Collaboration Steve – Dutch Data Protection Authority, now a privacy consultant Larry – Network Computing Group Leader, and Leader the Canadian Parts of the PISA project (Network Privacy, Scalability, & Trustworthy HCI)

Background: PISA 4 Million Euro, 4 countries, 3 years Commenced January 2003 PISA Legislation & PET WP2 WP1 Agent Application WP4 Knowledge Discovery WP3 Agent Security WP5.1 WP5.2 Privacy, Network & Scalability WP5.1 WP5.2 Privacy, Network & Scalability WP5.3 HCI & Trust WP5.3 HCI & Trust

Background DEPRM: A PISA development Framework for PET development in Multi- Agent Systems DEPRM offers an integrated approach to lawful distributed management of Personally Identifiable Information (PII)

Objectives Implement data privacy law (EU Data Directive 95/46) as accurately as possible within a Multi-Agent System Provide an integrate approach to implementation Influence the Foundation for Intelligent Physical Agents

Approach Constrain design to 95/46/EC To do this 95/46/EC was analyzed to generate requirements for an application domain Results are then implemented, consistent with the directive in late requirements phase Legal Corpus 95/46/EC Application Representation Analog Rendition

Approach Producing Application Representation by considering Directive Articles & Recitals in terms of what can be built into a system Secure Perceive Derive Dutch Data Protection Law

Approach Multidisciplinary team to implement the representation results in an analogue of the meaning of the law Privacy Specialist Ontologist Cryptosystem/ Security Agent Designer HCI Specialist

Approach Data Subject perception important in Directive articles, therefore HCI is vital to spirit of directive Four cognitive concepts elicited from Directive –Comprehend –Conscious –Control –Consent Interface development techniques were applied to address each requirement area, work underway at NRC

Approach Lawfully Managing PII is established in the Directive: particular models are not Code & computation integrity is mandated by directive Authentication required if agent representing controller (bound by directive)

Approach Data protection rules may be instantiated using ontology, a knowledge base, and interaction protocols Simplified data protection ontology has been created along with knowledge based in JESS Data transfer issues embedded in interaction protocols Architectural additions required as well

Conclusions DEPRM offers an integrated framework for complete provision of data protection law in user-oriented MAS applications Principles may be applied to non-MAS applications Data protection ontology may only take a literal agreed interpretation of the law Cryptography important to implement support for the logic of the law. Privacy implementation must be understood/felt by humans: HCI important aspect

Conclusions: What’s next Architectural requirements embedded through adoption of DRM model (Journal of Computer Security, Nov. 2002) HCI implications developed (submitted to IEEE Computer) Ontology/Agent implications under being implemented in PISA

Conclusions: What’s Next European Privacy Awarness and Consensus (EuroPAC) –FP6 consortium which will implement further DEPRM approaches –Members include NRC, IPC Ontario, Universities and commercial firms EuroPAC aims to become the EC’s de facto data protection development solution with a broad scope from DRM, Ontologies, HCI, standards, security as well as policy

Ontology-based Services Trust Services Value add Knowledge Services ASP-Platform Application Services XCOMPLIANCE © Knowledge Domains Trust Services Ontology Services Knowledge Exchange Business Process Interchange Knowledge Networks Semantic Web Privacy Information Retrieval Services - searching corpus - intranets - Internet Interoperability Services M2M : systems M2H : onto-forms Self-compliance Services

Thank You… Questions?