in order to protect them against non-authorized use by
the EHR provider. Consequently, the EHR provider
cannot use this data and so cannot offer additional ser-
vices.
In the next step we will specify the cryptographic
protocols of our scheme and apply a proof-of-concept
implementation on the use case of EHR. The proof-
of-concept implementation of DETECTIVE will be
evaluated against attacks on the protocol layer, i.e. on
the tagging and detecting protocol. Attacks will be
derived from the German IT Baseline Protection Cat-
alogue and from the Japanese Act on the Protection of
Personal Information. Secondly, the evaluation will
consider the economic requirements of services based
on electronic health records and investigate on its fea-
sibility for personal data as, e.g., x-ray images in the
EHR scenario.
ACKNOWLEDGEMENTS
This work has been funded by the Japan Society for
the Promotion of Science (JSPS). The cooperative
work between the University of Freiburg and the Na-
tional Institute of Informatics has been done within
their Memorandum of Understanding.
REFERENCES
Accorsi, R. (2007). Automated Privacy Audits to Com-
plement the Notion of Control for Identity Manage-
ment. In Policies and Research in Identity Manage-
ment. IFIP.
Camenisch, J. and Lysyanskaya, A. (2001). Efficient non-
transferable anonymous multi-show credential system
with optional anonymity revocation. In EUROCRYPT
2001, volume 2045 of Lecture Notes in Computer Sci-
ence, pages 91–118. Springer.
Casassa Mont, M. and Pearson, S. (2005). An Adaptive Pri-
vacy Management System for Data Repositories. In
Kazikas, S., Lopez, J., and Pernul, G., editors, Trust-
Bus 2005, volume 3592 of Lectures Notes in Com-
puter Science, pages 236–245, Heidelberg. Springer.
Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J.,
and Kalker, T. (2008). Digital Watermarking and
Steganography. Morgan Kaufmann.
European Commission (1995). Directive 95/46/EC of the
European Parliament and of the Council of 24 October
1995 on the protection of individuals with regard to
the processing of personal data and on the free move-
ment of such data. Official Journal of the European
Communities, L 281(395L0046):31–50.
gematik - Gesellschaft f¨ur Telematikanwend-
ungen der Gesundheitskarte mbH (2008).
¨
Ubergreifendes Datenschutzkonzept der
Gesundheitstelematik Version 0.9.0.
http://www.gematik.de/upload/gematik
DS Daten-
schutzkonzept
V0.9.0 3803.pdf.
Hilty, M., Basin, D., and Pretschner, A. (2005). On Obli-
gations. In de Capitani di Vimercati, S., Syverson, P.,
and Gollmann, D., editors, 10th European Symposium
on Research in Computer Security (ESORICS 2005),
volume 3679 of Lecture Notes in Computer Science,
pages 98–117. Springer.
Japanese Government (2005). Act on the
Protection of Personal Information.
http://www5.cao.go.jp/seikatsu/kojin/foreign/act.pdf,.
Karjoth, G., Schunter, M., and Waidner, M. (2002). Privacy-
enabled Services for Enterprises. In International
Workshop on Trust and Privacy in Digital Business
(Trustbus 2002), pages 483–487.
Mantel, H. (2001). Information Flow Control – Bridging a
Gap. In FME 2001, volume 2021 of Lecture Notes in
Computer Science, pages 153–172. Springer.
Pedersen, T. P. (1992). Non-Interactive and Information-
Theoretic Secure Verifiable Secret Sharing. In
CRYPTO 1991, volume 576 of Lecture Notes in Com-
puter Science, pages 129–140. Springer.
Pfitzmann, B. and Schunter, M. (1996). Asymmetric Fin-
gerprinting. In Eurocrypt 1996, volume 1070 of
Lecture Notes in Computer Science, pages 84–95.
Springer.
Pretschner, A., Hilty, M., and Basin, D. (2006). Dis-
tributed Usage Control. Communications of the ACM,
49(9):39–44.
Pretschner, A., Hilty, M., Sch¨utz, F., Schaefer, C., and Wal-
ter, T. (2008). Usage Control Enforcement: Present
and Future. IEEE Security and Privacy, 6(4):44–53.
Rosenblatt, B., Trippe, B., and Mooney, S. (2001). Digital
Rights Management: Business and Technology. John
Wiley & Sons.
Wohlgemuth, S. and M¨uller, G. (2006). Privacy with Dele-
gation of Rights by Identity Management. In Interna-
tional Conference on Emerging Trends in Information
and Communication Security (ETRICS 2006), volume
3995 of Lectures Notes in Computer Science, pages
175–190. Springer.
Zhou, X., Pang, H., Tan, K., and Mangla, D. (2005).
WmXML: A System for Watermarking XML Data.
In Proceedings of the 31st international conference on
Very Large Data Bases, pages 1138–1321.
ICE-B 2009 - International Conference on E-business
32