Privacy Enhancing Technologies
|Professors||Konstantinos Lambrinoudakis Angeliki Panou Eleni-Laskarina Makri|
|Lecture hours||3 hours|
|Lab hours||2 hours|
|Digital resources||View on Aristarchus (Open e-Class)|
The purpose of the course is to highlight the concept of privacy, especially in relation to personal and / or sensitive data exchanged through open public networks, such as the Internet, in the context of various electronic services. Existing privacy enhancing technologies are introduced and special reference is made to the privacy problems faced by specific categories of applications. The proposed treatment mechanisms are also presented.
In this context, the learning outcomes of the course, after its successful completion, are that the students will be able:
- to understand the basic concepts of privacy and personal data protection as well as how to recognize and analyze privacy requirements.
- to know the basic privacy requirements that need to be taken into account when designing, and to be satisfied in the implementation, of an information system.
- to analyse, evaluate and justify alternative technologies / mechanisms to protect privacy and meet the requirements.
- to design systems that protect the privacy of its users
- Definition of Privacy.
- Legal Framework for the Protection of Personal Data.
- Attacks on Privacy and Subjectivity of Impact in case of Privacy violation incidents.
- Requirements for anonymity, unlinkability, undetectability and unobservability.
- Identity Management.
- Privacy Enhancing Technologies (Anonymizer, LPWA, Onion Routing, Crowds, MixNets, etc.).
- Privacy protection in Ubiquitous Computing (RFIDs, Positioning Services), Internet Telephony, Health Information Systems, etc.
- The Greek Framework for Digital Authentication and the Unique Citizen Identification Number for Electronic Services Offered by Government Bodies.
- Privacy Economics
- A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. De Capitani di Vimercati (Eds) (2008) Digital Privacy, Theory, Technology and Practices., Auerbach Publications.
Associated scientific Journals
- IEEE Security and Privacy Magazine, IEEE
- International Journal of Information Security, Springer
- Computers and Security, Elsevier
- Requirements Engineering, Springer
- IEEE Transactions on Software Engineering, IEEE
- Security and Communication Networks, Wiley