Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- D13.1: Identity and impact of privacy enhancing technologie.
- D13.1 Addendum: Identity and impact of privacy enhancing technologies.
- D13.3: Study on ID number policies.
- D13.6 Privacy modelling and identity.
- D13.7: Workshop Privacy.
- D14.1: Workshop on Privacy in Business Processes.
- D14.2: Study on Privacy in Business Processes by Identity Management.
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
- D14.4: Workshop on “From Data Economy to Secure.
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Privacy-aware Business Process Design and Identity Management
Inventing privacy in business processes is the aim of this chapter. A general approach is presented by the Enterprise Privacy Architecture in order to identify business processes which make use of customers’ personal data or attributes and to implement privacy regulations via privacy policies in an information system of a service provider. One suggestion towards a data protection certification is presented by section 5.2. Section 5.2 proposes to apply process models for security in information and communication security for data protection. Section 5.3 investigates on current identity management system whether they preserve informational self-determination in single-stage and multi-stage business processes. The security properties of current identity management systems concerning disclosure of personal data and the security requirements for a self-determined use of disclosed personal data are introduced in section 5.4. Section 5.5 summarises the results of this chapter.
21 / 38 |