Zum Hauptinhalt springen

Showing 1–8 of 8 results for author: Metayer, D L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2008.01621  [pdf, other

    cs.CR

    DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems

    Authors: Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, Cédric Lauradoux, Daniel Le Métayer, Vincent Roca

    Abstract: This document presents an evolution of the ROBERT protocol that decentralizes most of its operations on the mobile devices. DESIRE is based on the same architecture than ROBERT but implements major privacy improvements. In particular, it introduces the concept of Private Encounter Tokens, that are secret and cryptographically generated, to encode encounters. In the DESIRE protocol, the temporary I… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

  2. arXiv:1903.06068  [pdf, ps, other

    cs.CR

    Analysis of Privacy Policies to Enhance Informed Consent (Extended Version)

    Authors: Raúl Pardo, Daniel Le Métayer

    Abstract: In this report, we present an approach to enhance informed consent for the processing of personal data. The approach relies on a privacy policy language used to express, compare and analyze privacy policies. We describe a tool that automatically reports the privacy risks associated with a given privacy policy in order to enhance data subjects' awareness and to allow them to make more informed choi… ▽ More

    Submitted 15 March, 2019; v1 submitted 14 March, 2019; originally announced March 2019.

    Comments: Extended Version

  3. arXiv:1812.06773  [pdf, other

    cs.CY

    A Generic Information and Consent Framework for the IoT

    Authors: Mathieu Cunche, Daniel Le Métayer, Victor Morel

    Abstract: The Internet of Things (IoT) raises specific issues in terms of information and consent, which makes the implementation of the General Data Protection Regulation (GDPR) challenging in this context. In this report, we propose a generic framework for information and consent in the IoT which is protective both for data subjects and for data controllers. We present a high level description of the fra… ▽ More

    Submitted 17 December, 2018; originally announced December 2018.

  4. arXiv:1702.08301  [pdf, other

    cs.CR cs.LO

    Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures

    Authors: Julien Bringer, Herve Chabanne, Daniel Le Metayer, Roch Lescuyer

    Abstract: This work aims to show the applicability, and how, of privacy by design approach to biometric systems and the benefit of using formal methods to this end. Starting from a general framework that has been introduced at STM in 2014, that enables to define privacy architectures and to formally reason about their properties, we explain how it can be adapted to biometrics. The choice of particular techn… ▽ More

    Submitted 1 March, 2017; v1 submitted 27 February, 2017; originally announced February 2017.

  5. arXiv:1504.03877  [pdf

    cs.CY

    The control over personal data: True remedy or fairy tale ?

    Authors: Christphe Lazaro, Daniel Le Métayer

    Abstract: This research report undertakes an interdisciplinary review of the concept of "control" (i.e. the idea that people should have greater "control" over their data), proposing an analysis of this con-cept in the field of law and computer science. Despite the omnipresence of the notion of control in the EU policy documents, scholarly literature and in the press, the very meaning of this concept rema… ▽ More

    Submitted 15 April, 2015; originally announced April 2015.

  6. Privacy and Data Protection by Design - from policy to engineering

    Authors: George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner

    Abstract: Privacy and data protection constitute core values of individuals and of democratic societies. There have been decades of debate on how those values -and legal obligations- can be embedded into systems, preferably from the very beginning of the design process. One important element in this endeavour are technical mechanisms, known as privacy-enhancing technologies (PETs). Their effectiveness has… ▽ More

    Submitted 10 April, 2015; v1 submitted 12 January, 2015; originally announced January 2015.

    Comments: 79 pages in European Union Agency for Network and Information Security (ENISA) report, December 2014, ISBN 978-92-9204-108-3

    MSC Class: 94A60 ACM Class: K.4.1; D.4.6; H.2.0

  7. Privacy by Design: From Technologies to Architectures (Position Paper)

    Authors: Thibaud Antignac, Daniel Le Métayer

    Abstract: Existing work on privacy by design mostly focus on technologies rather than methodologies and on components rather than architectures. In this paper, we advocate the idea that privacy by design should also be addressed at the architectural level and be associated with suitable methodologies. Among other benefits, architectural descriptions enable a more systematic exploration of the design space.… ▽ More

    Submitted 30 September, 2014; originally announced October 2014.

    Journal ref: APF - Annual Privacy Forum 2014 8450 (2014) 1-17

  8. arXiv:1408.1854  [pdf, other

    cs.CR

    Privacy Architectures: Reasoning About Data Minimisation and Integrity

    Authors: Thibaud Antignac, Daniel Le Métayer

    Abstract: Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task. We propose an approach based on the specification of privacy architectures and focus on a key aspect of privacy, data minimisation, and its tension with integrity requ… ▽ More

    Submitted 8 August, 2014; originally announced August 2014.

    Comments: appears in STM - 10th International Workshop on Security and Trust Management 8743 (2014)