You are here: Press & Events > 2006 FIDIS Events > IST2006 > 

Workshop: Business Models and Identity

Enterprises and governmental agencies process personal data of their clients for, e.g., personalised services and to get access to services as a proxy for them. By the directives 95/46/EC & 2002/58/EC, the EC has defined data protection and security principles in order to regulate the processing of personal data. User centric identity management (IdM) empowers clients in controlling the disclosure of their personal data to organisations. For information chains as found in multi-staged processes IdM may lead to a big-brother phenomenon. Clients have to trust organisations that they process personal data according to their privacy and security policies, along the chain of participating parties. This workshop aims at these challenges and discusses first approaches for privacy enhancing technologies (PET) & trusted computing (TC) and their use in current and future business & governmental process models. The workshop itself will be jointly organised by the FIDIS, OpenTC, and PRIME project.

Workshop Report

Chaired by: Denis Royer

Speakers: Kai Rannenberg (JWG), Marit Hansen (ICPP), Jan Camenisch (IBM), & Pete Bramhall, (HP), Sven Wohlgemuth (Freiburg University), Dirk Kuhlmann (HP), Ammar Alkassar (Sirrix AG).

Attendants: about 70-80

The session “Business Models and Identity” addressed the usage of privacy enhancing technologies (PET) & trusted computing (TC) in current and future business & governmental process models. In the first presentation of the session, Kai Rannenberg gave an introduction to the topical cluster of privacy and identity management as business enablers. The second, joint talk by Marit Hansen, Jan Camenisch, and Pete Bramhall presented privacy-related services in identity management and their application fields. In the information society, users can act and interact in a safe and secure way while retaining control of their private sphere. Therefore user centric identity management is needed to guarantee this. The third presentation by Sven Wohlgemuth explains how privacy in business processes can be achieved by the use of identity management. Here, the challenges lie within the linkability, the delegation, and the unaware collection of profiles. The final two presentations by Dirk Kuhlmann and Ammar Alkassar discussed the role of trusted computing for identity management and the application of this technology for privacy aware business processes. During these presentations, several usage scenarios for the application of PETs and TC were given. The session was closed by an open discussion panel, further discussing the attendants’ questions.

Presentations:

Chair for M-Commerce - Frankfurt University
OpenTC project
Unabhängigen Landeszentrum für Datenschutz Schleswig-Holstein
Institut für Informatik und Gesellschaft
  1. Denis Royer (Frankfurt University): Introduction
  2. Kai Rannenberg (Frankfurt University): "Privacy and Identity Management as Business Enablers"
  3. Marit Hansen (ICPP), Jan Camenisch, & Pete Bramhall (HP): "Privacy-Related Services in Identity Management" (joint talk)
  4. Sven Wohlgemuth (Freiburg University): "Privacy in Business Processes by Identity Management"
  5. Dirk Kuhlmann (HP): "The Role of Trusted Computing for Identity Management"
  6. Ammar Alkassar (Sirrix AG): "Trustworthy Computing for Privacy-Aware Business Services"
  7. Open discussion in plenary