The Architecture Of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards
by Courtney Bowman /
2015 / English / PDF
18.4 MB Download
Technology’s influence on privacy has become a matter of
everyday concern for millions of people, from software
architects designing new products to political leaders and
consumer groups. This book explores the issue from the
perspective of technology itself: how privacy-protective
features can become a core part of product functionality,
rather than added on late in the development process.
Technology’s influence on privacy has become a matter of
everyday concern for millions of people, from software
architects designing new products to political leaders and
consumer groups. This book explores the issue from the
perspective of technology itself: how privacy-protective
features can become a core part of product functionality,
rather than added on late in the development process.The Architecture of Privacy
The Architecture of Privacy will not only help empower
software engineers, but also show policymakers, academics, and
advocates that, through an arsenal of technical tools,
engineers can form the building blocks of nuanced policies that
maximize privacy protection and utility—a menu of what to
demand in new technology.
will not only help empower
software engineers, but also show policymakers, academics, and
advocates that, through an arsenal of technical tools,
engineers can form the building blocks of nuanced policies that
maximize privacy protection and utility—a menu of what to
demand in new technology.
Topics include:
Topics include:How technology and privacy policy interact and influence
one another
How technology and privacy policy interact and influence
one anotherPrivacy concerns about government and corporate data
collection practices
Privacy concerns about government and corporate data
collection practicesApproaches to federated systems as a component of
privacy-protecting architecture
Approaches to federated systems as a component of
privacy-protecting architectureAlternative approaches to compartmentalized access to data
Alternative approaches to compartmentalized access to dataMethods to limit the amount of data revealed in searches,
sidestepping all-or-nothing choices
Methods to limit the amount of data revealed in searches,
sidestepping all-or-nothing choicesTechniques for data purging and responsible data retention
Techniques for data purging and responsible data retentionKeeping and analyzing audit logs as part of a program of
comprehensive system oversight
Keeping and analyzing audit logs as part of a program of
comprehensive system oversightSecurity architecture that includes separation of roles and
minimum access to data, while avoiding a single point of trust
Security architecture that includes separation of roles and
minimum access to data, while avoiding a single point of trustForecast of likely developments, and recommendations on how
to address or alter them
Forecast of likely developments, and recommendations on how
to address or alter them