{"id":183715,"date":"2006-02-17T00:00:00","date_gmt":"2009-10-31T12:58:11","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/msr-research-item\/viewing-privacy-as-a-security-property\/"},"modified":"2016-09-09T09:59:42","modified_gmt":"2016-09-09T16:59:42","slug":"viewing-privacy-as-a-security-property","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/viewing-privacy-as-a-security-property\/","title":{"rendered":"Viewing Privacy as a Security Property"},"content":{"rendered":"
\n

In recent years user privacy has become an issue for computer system designers, service providers, and an active field of study in academia. Yet it is often seen as a side-issue, or an add-on to already established software or service models. Sometimes privacy is even seen as antithetical to security.<\/p>\n

This talk will argue that privacy properties are merely security properties that focus on the interests of users. We shall examine the state of the art in privacy technology that attempts to provide anonymity, plausible deniability, forward secrecy, personal data minimisation and compulsion resistance and censorship\/blocking resistance. I will illustrate how each of these can be used to satisfy particular security needs that users encounter routinely.<\/p>\n

Such privacy properties are becoming increasingly important, and can be seen as key security properties expected by home or small business users \u2013 often more important then conventional security notions, such as hard confidentiality or non-repudiation of signatures.<\/p>\n<\/div>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

In recent years user privacy has become an issue for computer system designers, service providers, and an active field of study in academia. Yet it is often seen as a side-issue, or an add-on to already established software or service models. Sometimes privacy is even seen as antithetical to security. This talk will argue that […]<\/p>\n","protected":false},"featured_media":195160,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"research-area":[],"msr-video-type":[],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-183715","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/Utvy2kryrsY","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/183715"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/183715\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/195160"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=183715"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=183715"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=183715"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=183715"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=183715"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=183715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}