Outlining “Data Track”: Privacy-friendly Data Maintenance for End-users

  • John Sören Pettersson
  • Simone Fischer-Hübner
  • Mike Bergmann

We present a complex function that we argue enhances the usefulness of so-called Privacy-Enhancing Technologies (PETs [4]). The background for this conceptual development is PRIME, Privacy and Identity Management for Europe – an integrated EU project within the Information Society Technology track of the 6th Framework Program [12]. The project is directed towards a holistic architecture and framework for identity management where data processors and citizens alike will be able to engage in secure and privacy-friendly communication over the Internet and mobile phone networks.


Privacy Policy Personal Data Data Track Prime System Service Side 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Andersson Ch, Camenisch J, Crane S, Simone Fischer-Hübner S, Leenes R, Pearson S, Pettersson JS, Sommer D (2005) Trust in PRIME. In Pro-ceedings of the 5th IEEE Int. Symposium on Signal Processing and IT, December 18-21, Athens, Greece, 2005.Google Scholar
  2. 2.
    Article 29 Data Protection Working Party. Opinion on More Harmonised Information provisions. 11987/04/EN WP 100, November 25, 2004. http://ec.europa.eu/justice_home/fsj/privacy/workinggroup/wpdocs/2004 _en.htm.
  3. 3.
    Bergmann M, Rost M, Pettersson JS (2005/6) Exploring the Feasibility of a Spatial User Interface Paradigm for Privacy-Enhancing Technology. In Nilsson et al. (eds.) Advances in Information Systems Development, Vol. 1, (proc. ISD 2005) Springer-Verlag, pages 437-448.Google Scholar
  4. 4.
    Blarkom GW van, Borking JJ, Olk JGE (eds) (2003) Handbook of Pri-vacy and Privacy-Enhancing Technologies. College bescherming per-soonsgegevens, The Hague. http://www.andrewpatrick.ca/pisa/handbook/
  5. 5.
    Borking, J, Raab, C, 2001. Law, PETs and Other Technologies for Pri- vacy Protection, Journal of Information, Law and Technology, Vol. 1.Google Scholar
  6. 6.
    Camenisch J, Shelat A (2006) PRIME Deliverable D16.1.e Second Annual Research Report. https://www.primeproject.eu/prime_products/ reports/res/
  7. 7.
    Cameron K, Jones MB (2006) Design Rationale behind the Identity Metasystem Architecture. http://research.microsoft.com/∼mbj/papers/Identity_Metasystem_Design_Rationale.pdf
  8. 8.
    Casassa Mont M, Pearson S, Crane S, 2005. Handling Privacy Obliga-tions and Constraints to Underpin Trust and Assurance, HP External Technical Report, HPL-2005-54, http://www.hpl.hp.com/techreports/2005/HPL-2005-54.html.
  9. 9.
    Casassa Mont M, Pearson S, Thyne R (2006) A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises, 3rd International Conference on Trust, Privacy & Security in Digital Business, TrustBus 2006, 4-8 Sep., Krakow, http://www.icsd.aegean.gr/trustbus06/
  10. 10.
    Cranor L, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle J (2002) The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation 16 April 2002. W3C, http://www.w3.org/TR/P3P/.
  11. 11.
    Donker H, Liesebach K, Borcea-Pfitzmann K (2006) PRIME Deliverable D13.1.c General Public Tutorial. https://www.prime-project.eu/pri-me_products/reports/tuto/
  12. 12.
    Fischer-Huebner S, Andersson Ch, Holleboom T (eds) (2005) PRIME Deliverable D14.1.a Framework V1. https://www.prime-project.eu/prime_products/reports/fmwk/
  13. 13.
    Korba L, Kenny S (2002) Towards Meeting the Privacy Challenge: Adapting DRM. Inst. for Information Technology, National Research Council of Canada. http://iit-iti.nrc-cnrc.gc.ca/iit-publications-iti/docs/NRC-44956.pdf
  14. 14.
    Leenes R, Lips M (2004) Social Evaluation of Early Prototypes, chapter 3 in PRIME Deliverable D6.1.b Evaluation of Early Prototypes. See [16] below.Google Scholar
  15. 15.
    Nielsen J, Molich R, Snyder C, Farell S (2000) E-commerce user experi-ence: Trust. Nielsen Norman Group.Google Scholar
  16. 16.
    Pettersson JS, Fischer-Hübner S (eds) (2004) PRIME Deliverable D6.1.b Evaluation of Early Prototypes. https://www.prime-project.eu/prime_products/reports/eval/
  17. 17.
    Schunter M, Powers C (2003) The Enterprise Privacy Authorization Language, EPAL 1.1 specification, http://www.zurich.ibm.com/security/enterprise-privacy/epal/

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • John Sören Pettersson
    • 1
  • Simone Fischer-Hübner
    • 1
  • Mike Bergmann
    • 2
  1. 1.Karlstad UniversitySweden
  2. 2.Technical University DresdenGermany

Personalised recommendations