You are here: Resources > FIDIS Deliverables > Privacy and legal-social content > D14.4: Workshop on “From Data Economy to Secure > 
Workshop on “From Data Economy to Secure Logging as a Step towards Transparency”  Title:
AGENDA AND SLIDES
 Results

 

Agenda and Slides

The workshop was held during the 2nd FIDIS Research Event on September 11th, 2007 in Athens. The following presentations have been given:

 

Tuesday, September 11th, 2007

09h00-09h20 

Sven Wohlgemuth (ALU-FR): From Data Economy to Secure Logging as a Step towards Transparency 

Ambient Intelligence environments lead to a collection of contextual and personal data for personalised services which is unaware for their users. This stems from the deployment of RFID tags of goods, sensors and cameras observing the users in, e.g., a shop such as the “Future Store” of the METRO AG. Therefore, users are not able to decide on the disclosure of their data. Either they do not participate in such environments or they have to trust service providers to use their personal data according to the privacy policy. The concept of usage control, with obligations as rules, for a desired use of personal data is an approach allowing users to control the use of their personal data. It has been shown that current privacy mechanisms support access control over personal data but not its use. Privacy policy languages, such as P3P or EPAL, support obligations but do not offer the possibility for users to verify whether obligations have been enforced. The aim is to identify requirements for a mechanism which generates privacy evidences in order to offer users proof that they can trust service providers. Log data are the foundation for privacy evidences, since they should reflect the enforcement of obligations and identify the misuse of personal data should it occur. This talk presented the requirement of the authenticity of log data and an approach toward generating them using a secure logging protocol.

09h20-09h40 

Eleni Kosta (ICRI): Legal Requirements of Secure Logging 

From the view of legislation, log data is also personal data and, as such, must be protected. This talk focuses on the two main legal requirements of the “right to access log data for users” and the “right to be informed”. This also means that there should be integrity control over logging activities, the collected data must be authentic and the logging activities must be accountable. Timestamps and trust services such as the eSignature Directive are proposed. The talk further introduces privacy principles and security criteria which have to be fulfilled by a secure logging system in order to pass legal evaluation. 

09h40-10h00 

Martin Meints (ICPP): International Security Standards and Logging 

This talk introduces the definition of logging according to the ISO/IEC 270xx series of security standards as well as CobiT and ISO/IEC 15408. It concludes that third party (e.g. user) interests are not covered, though protocol data from enterprises is increasingly used by the state. It points out that if logging mechanisms according to these standards are used, the administrator of the system has unlimited access to the data logged. 

10h00-10h20 

Stefan Berthold (TUD): Technical Aspects of Secure Logging – Requirements, Approaches, Limitations 

This talk focuses on the semantic interpretation of log data and its interpretable presentation to users lacking security knowledge.  Stefan Berthold presented the concept of lattices for semantic interpretation and the of town maps for presentation.

10h20-10h30 

Rani Husseiki (SIRRIX): D14.5 Experimental Study on Profiling in Business Processes 

This talk introduces the experimental study according to its goals (detecting the misuse of personal data) and approach. Students apply for various loyalty programs and make minor mistakes in their names. For example, if an address is sold to an advertising company, it is possible to determine who sold the personal data. The results will be summarized by a survey. 

10h30-11h00 

Coffee break 

11h00-12h30 

Coordination of D14.5, D14.6 and proposals for the 5th work plan

The results of the discussion include a sketch of the table of contents of D14.6, its schedule and an agreement upon a publication for the 5th work plan to summarize the results from WP14.  Concerning the 5th work plan, a study of the means by which users can verify the logging of data and only view their own details, was proposed and discussed. The proposal needs refinement before presenting it for the 5th work plan.

 

The slides are available at http://internal.fidis.net/interactive/filemanager/files/workpackages/?dir=wp14%2Fworkshop_d14.4.

 

Workshop on “From Data Economy to Secure Logging as a Step towards Transparency”  fidis_wp14_d14.4_Workshop_From_Data_Economy_to_Secure_Logging_as_a_Step_towards_Transparency_FINAL.sxw  Results
4 / 7