Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Data minimisation in communication protocols: a formal analysis framework and application to identity management
Veeningen M., de Weger B., Zannone N. International Journal of Information Security13 (6):529-569,2014.Type:Article
Date Reviewed: May 20 2015

The amount of data exchanged on the Internet is growing every day, outpacing the growth in speed of communication protocols. So to avoid data congestion, solutions are needed quickly: one of them could be data minimization, which consists of transmitting only the data needed to accomplish the task at hand. This is useful in all circumstances, but becomes paramount when applied to fields like identity management and privacy protection, which have profound implications in everyday life.

This paper, developed at the Coding Theory and Cryptology Group at Eindhoven University of Technology, basically compares protocols implementing data minimization. It first establishes an overall formal model to define personal information, essential to yield measurable and verifiable results when applied to real-life scenarios; this model is described both in plain text and in mathematical terms. Then, the authors test several protocols against this model using a prototype Prolog application, which is mentioned but not described in detail. Finally, as a real-life case study, the method is applied to four widespread applications: smart certificates, a linking service model, an identity mixer, and a smartcard scheme. The authors test how well these scenarios adhere to the mathematical model previously defined.

This research paper is not particularly suited for lay people, or even IT practitioners. However, aside from the immediate interest of its results, with its rich reference section, it takes the pulse of the coding and cryptology communities.

Reviewer:  Andrea Paramithiotti Review #: CR143451 (1509-0839)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Privacy (K.4.1 ... )
 
 
Formal Methods (D.2.4 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Security, Integrity, And Protection (H.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Privacy": Date
Handbook of personal data protection
Madsen W., Stockton Press, New York, NY, 1992. Type: Book (9780333569207)
Nov 1 1993
Privacy and security issues in information systems
Turn R., Ware W., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
Data bases
Burnham D., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy