Lecture: Privacy in Ubiquitous Computing

Course:

  • Responsible: Jun.-Prof. Dr. Delphine Reinhardt (née Christin)
  • Start: 19.10.2017. Please note: Jun.-Prof. Delphine Reinhardt and her team will only offer the lecture on privacy in ubiquitous computing till December 2017. The exams will take place during the usual period.
  • Dates: Thu. 12:30 to 14:00, weekly, LBH/HS III.03a
  • Course number: 612113106

Exercises:

  • Responsible: Jun.-Prof. Dr. Delphine Reinhardt (née Christin)
  • Start: 26.10.2017. Please note: Jun.-Prof. Delphine Reinhardt and her team will only offer the exercises on privacy in ubiquitous computing till December 2017.
  • Dates: Thu. 14:30 to 16:00, weekly, LBH/HS III.03a

Other:

  • Term: Master
  • Requirements:
  • Faculty: M. Sc. Computer Science
  • Effort: 2L+2E / 6CP

Description

Technical skills: Students gain knowledge about key concepts of privacy (including legal and economical aspects) and field of ubiquitous computing. They are able to identify threats to privacy in given application scenarios. They learn fundamental techniques to protect users’ privacy. Relying on this background, they are able to understand and analyze cutting-edge solutions.

Soft skills: Written and oral communicative skills, critical thinking and problem solving skills, teamwork, and time management

Contents: Introduction to privacy and ubiquitous computing, privacy threats, privacy-enhancing systems in selected scenarios, usable privacy

Literature

John Krumm, Ubiquitous Computing Fundamentals, Crc Pr Inc, 2009

Alessandro Acquisti, Stefans Gritzalis, Costos Lambrinoudakis, Digital Privacy: Theory, Technologies, and Practices, Auerbach Pubn, 2007

Mireille Hildebrandt, Kieron O'Hara, Michael Waidner, Robert Madelin, Digital Enlightenment Yearbook 2013: The Value of Personal Data, Ios Press, 2013

Jan Camenisch, Simone Fischer-Hübner, Kai Rannenberg, Privacy and Identity Management for Life, Springer, 2011

Additional research literature will be announced during the lecture.