Volltext-Downloads (blau) und Frontdoor-Views (grau)
The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 32 of 1253
Back to Result List

Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets

  • This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloomfilter based privacy approach is a valuable technical building block for the arising General Data Protection RegulationThis work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloomfilter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to performsome privacy saving setrelations on a mobiletelco’s access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.show moreshow less

Export metadata

Statistics

frontdoor_oas
Metadaten
Document Type:Conference Proceeding
Conference Type:Konferenzartikel
Zitierlink: https://opus.hs-offenburg.de/3839
Bibliografische Angaben
Title (English):Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets
Conference:CECC 2019: Central European Cybersecurity Conference, November 14 - 15, 2019, Munich Germany
Author:Louis TajanStaff Member, Dirk WesthoffStaff MemberGND
Year of Publication:2019
Contributing Corporation:Central European Cybersecurity Conference
Place of publication:New York
Publisher:ACM
First Page:1
Last Page:6
Article Number:16
Parent Title (English):CECC 2019: Proceedings of the Third Central European Cybersecurity Conference
ISBN:978-1-4503-7296-1
DOI:https://doi.org/10.1145/3360664.3360680
Language:English
Inhaltliche Informationen
Institutes:Forschung / ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik
Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021)
Institutes:Bibliografie
Formale Angaben
Open Access: Closed Access 
Licence (German):License LogoUrheberrechtlich geschützt