- Student knows and understands the legal principles underlying data protection, and knows how to apply them.
- Student knows the state of the art in privacy enhancing technologies, and is aware of their limitations when applied in practice.
- Student can apply some of these PETs to solve a specific problem, and can argue the extent of which this solution actually solves the problem.
- Student can perform applied scientific research in a group of 2-3 persons.
- Student can formulate a scientific research question and relate this to the larger societal context
- Student can efficiently give a lecture on a selected topic for 45 minutes.
- Student can write a readable and technically sound paper on another selected topic, and is able to clearly express and support his own point of view.
|
|
Privacy has always been a controversial topic. Governments and business want to collect information about their citizens and customers - for their own benefit as well their clients. In surveys, people claim that they value their privacy. In practice, people give away personal information very easily, either because they do not receive a service otherwise, or because they are unable to protect that information reliably. With the calls for ever increasing security - after the events of the last few years - privacy has eroded even further, it seems.
In this seminar we will explore the state of the art in privacy enhancing technologies (PET), and discuss theories (technical, legal and societal) of privacy.
|
|
|
Students should have succesfully completed the Cryptography course. |
|
Consists of 2 parts:
- Giving a 2 hour presentation and opposition
- Writing a research paper
The final grade is determined by a weighted average of the grades on these parts, provided that all grades are larger than or equal to a 5.5 |
|
For more information refer to the course website, http://www.cs.ru.nl/~jhh/secsem.html |
|