Skip to main content

Accountable Privacy (Transcript of Discussion)

  • Conference paper
Security Protocols (Security Protocols 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3957))

Included in the following conference series:

  • 405 Accesses

Abstract

Initially Mike and I had the idea that we would each take sides; one would be accountability, one would be privacy, and we’d debate, but actually both of us wanted to be on the privacy side. So instead I’ll talk for a while about this apparent conflict between privacy on the one hand and accountability on the other. We’ll look at a number of existing technologies, some open questions, and although I guess there’s no new research in the paper now, the hope is that looking at things through this lens might ultimately lead to new solutions. We’re all aware that change in technology is making privacy much harder: we have much more use of computers, computers are heavily networked, storage costs are going way down, and computers are getting more powerful, so we have increased ability to process and store large amounts of data. So whereas it used to be we had to work hard to make information public – that’s what a lot of computer science was about, getting information from one place to another in a reliable and persistent way – now the infrastructure has evolved to make that very easy. What’s become harder is to keep the information private, understanding where it flows, when it flows, and the fallout of it all. And the issue of privacy has become much more critical as public awareness increases of this new world that we’re in and as potential misuse starts to be on the rise, and also I think as these conflicting roles increase: the desire for privacy on the one hand, and the desire for using this information on the other hand.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wright, R.N. (2006). Accountable Privacy (Transcript of Discussion). In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2004. Lecture Notes in Computer Science, vol 3957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11861386_11

Download citation

  • DOI: https://doi.org/10.1007/11861386_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40925-0

  • Online ISBN: 978-3-540-40926-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics