{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:40:05Z","timestamp":1743136805063,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031579776"},{"type":"electronic","value":"9783031579783"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T00:00:00Z","timestamp":1713830400000},"content-version":"vor","delay-in-days":113,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Governments are increasingly becoming providers of data-driven services to both citizens and organisations. As the number of these services grows, the government will store greater amounts of personal and company data. Data minimisation and data protection can be legal obligations, especially for governments that have passed data protection and privacy regulations. However, even without such regulation, processing only as much data as is necessary, is good information security practice. In this paper, we give an overview of how we put together a Privacy Enhancing Technology (PET) concept and roadmap for an e-government, including motivations, an adoption strategy and blueprints for services that benefit from PETs.<\/jats:p>","DOI":"10.1007\/978-3-031-57978-3_1","type":"book-chapter","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T04:01:50Z","timestamp":1713758510000},"page":"3-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Blueprints for\u00a0Deploying Privacy Enhancing Technologies in\u00a0E-Government"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1479-2195","authenticated-orcid":false,"given":"Liina","family":"Kamm","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9296-9120","authenticated-orcid":false,"given":"Dan","family":"Bogdanov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9996-6333","authenticated-orcid":false,"given":"Eduardo","family":"Brito","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6355-0737","authenticated-orcid":false,"given":"Andre","family":"Ostrak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,23]]},"reference":[{"key":"1_CR1","unstructured":"Article 29 Data Protection Working Party: Opinion 05\/2014 on anonymisation techniques (2014). https:\/\/www.cnil.fr\/sites\/default\/files\/atoms\/files\/88197.pdf"},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1515\/popets-2016-0019","volume":"2016","author":"D Bogdanov","year":"2016","unstructured":"Bogdanov, D., Kamm, L., Kubo, B., Rebane, R., Sokk, V., Talviste, R.: Students and taxes: a privacy-preserving study using secure computation. PoPETs 2016(3), 117\u2013135 (2016). https:\/\/doi.org\/10.1515\/popets-2016-0019","journal-title":"PoPETs"},{"key":"1_CR3","unstructured":"CNIL: Privacy Impact Assessment (PIA) (2018). https:\/\/www.cnil.fr\/en\/PIA-privacy-impact-assessment-en"},{"key":"1_CR4","unstructured":"Cybernetica AS: Privacy Enhancing Technology Concept (in Estonian). Technical report, Ministry of Economic Affairs and Communications (2023). https:\/\/www.kratid.ee\/_files\/ugd\/980182_f1288bebbb57466ead0241748d49d8ec.pdf"},{"key":"1_CR5","unstructured":"Cybernetica AS: Privacy Enhancing Technology Roadmap (in Estonian). Technical report, Ministry of Economic Affairs and Communications (2023). https:\/\/www.kratid.ee\/_files\/ugd\/980182_64478f7163b74f299f5879b6eea856af.pdf"},{"key":"1_CR6","unstructured":"Department of Economic and Social Affairs: E-Government Survey 2022. The Future of Digital Government. Technical report, United Nations (2022)"},{"key":"1_CR7","unstructured":"Fair Lines America Foundation: Declaration of John M. Abowd. https:\/\/s3.documentcloud.org\/documents\/21018464\/fair-lines-america-foundation-july-26-2021-declaration-of-john-m-abowd.pdf"},{"key":"1_CR8","unstructured":"H.R.1565 - Student Right to Know Before You Go Act of 2019 (2019). https:\/\/www.congress.gov\/bill\/116th-congress\/house-bill\/1565\/text"},{"key":"1_CR9","unstructured":"Infocomm Media Development Authority: Privacy Enhancing Technologies (PET) Sandbox (2022). https:\/\/www.imda.gov.sg\/How-We-Can-Help\/Data-Innovation\/Privacy-Enhancing-Technologies-Sandbox"},{"key":"1_CR10","unstructured":"ISO\/IEC TR 27550:2019 Information technology\u2014Security techniques\u2014Privacy engineering for system life cycle processes (2019). https:\/\/www.iso.org\/standard\/72024.html"},{"key":"1_CR11","unstructured":"IVXV raamistiku n\u00f5uded kr\u00fcptos\u00fcsteemile. https:\/\/www.valimised.ee\/et\/e-haaletamine\/dokumendid"},{"key":"1_CR12","unstructured":"McKenna, L.: Disclosure Avoidance Techniques Used for the 1970 through 2010 Decennial Censuses of Population and Housing. https:\/\/ideas.repec.org\/p\/cen\/wpaper\/18-47.html"},{"key":"1_CR13","unstructured":"Meijaard, Y., van Heesch, M., Cramer, R., Groenland, J.: Netherlands Cryptoland. Starting point of the cryptocommunications roadmap (2021). https:\/\/dcypher.nl\/file\/download\/f67b5ad2-beee-4fdc-936c-5ac7b5fa3fea\/netherlands-cryptoland-exploratory.pdf"},{"key":"1_CR14","unstructured":"Ministry of Economic Affairs and Communications: Estonian Digital Agenda 2030. Tech. rep., Ministry of Economic Affairs and Communications (2021). https:\/\/www.mkm.ee\/en\/e-state-and-connectivity\/digital-agenda-2030"},{"key":"1_CR15","unstructured":"Nordic Institute For Interoperability Solutions: X-Road\u00ae Development Roadmap. https:\/\/x-road.global\/development-roadmap"},{"issue":"4","key":"1_CR16","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TCBB.2018.2854776","volume":"16","author":"JL Raisaro","year":"2018","unstructured":"Raisaro, J.L., et al.: MedCo: enabling secure and privacy-preserving exploration of distributed clinical and genomic data. IEEE\/ACM Trans. Comput. Biol. Bioinf. 16(4), 1328\u20131341 (2018)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinf."},{"key":"1_CR17","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"issue":"1","key":"1_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-019-10933-3","volume":"10","author":"L Rocher","year":"2019","unstructured":"Rocher, L., Hendrickx, J.M., De Montjoye, Y.A.: Estimating the success of re-identifications in incomplete datasets using generative models. Nat. Commun. 10(1), 1\u20139 (2019)","journal-title":"Nat. Commun."},{"key":"1_CR19","unstructured":"van\u00a0der Sangen, M.: CBS explores possible privacy preserving techniques (2021). https:\/\/www.cbs.nl\/en-gb\/corporate\/2021\/14\/cbs-explores-possible-privacy-preserving-techniques"},{"issue":"3","key":"1_CR20","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1215\/18752160-8698301","volume":"14","author":"H Stevens","year":"2020","unstructured":"Stevens, H., Haines, M.B.: TraceTogether: pandemic response, democracy, and technology. East Asian Sci. Technol. Soc.: Int. J. 14(3), 523\u2013532 (2020). https:\/\/doi.org\/10.1215\/18752160-8698301","journal-title":"East Asian Sci. Technol. Soc.: Int. J."},{"key":"1_CR21","unstructured":"Swiss Post: Cryptographic Primitives of the Swiss Post Voting System. https:\/\/gitlab.com\/swisspost-evoting\/crypto-primitives\/crypto-primitives\/-\/blob\/master\/Crypto-Primitives-Specification.pdf"},{"key":"1_CR22","unstructured":"Technology Analysis Division of the Office of the Privacy Commissioner of Canada: Privacy enhancing technologies \u2013 a review of tools and techniques (2017). https:\/\/www.priv.gc.ca\/en\/opc-actions-and-decisions\/research\/explore-privacy-research\/2017\/pet_201711"},{"key":"1_CR23","unstructured":"The Royal Society: from privacy to partnership: the role of privacy enhancing technologies in data governance and collaborative analysis (2023). https:\/\/royalsociety.org\/-\/media\/policy\/projects\/privacy-enhancing-technologies\/From-Privacy-to-Partnership.pdf"},{"key":"1_CR24","unstructured":"The White House: US and UK launch innovation prize challenges in privacy-enhancing technologies to tackle financial crime and public health emergencies (2020). https:\/\/www.whitehouse.gov\/ostp\/news-updates\/2022\/07\/20\/u-s-and-u-k-launch-innovation-prize-challenges-in-privacy-enhancing-technologies-to-tackle-financial-crime-and-public-health-emergencies"},{"issue":"9","key":"1_CR25","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/3524107","volume":"65","author":"C Troncoso","year":"2022","unstructured":"Troncoso, C., et al.: Deploying decentralized, privacy-preserving proximity tracing. Commun. ACM 65(9), 48\u201357 (2022). https:\/\/doi.org\/10.1145\/3524107","journal-title":"Commun. ACM"},{"key":"1_CR26","unstructured":"United Nations Committee of Experts on Big Data and Data Science for Official Statistics: United Nations Guide on Privacy-Enhancing Technologies for Official Statistics (2023). https:\/\/unstats.un.org\/bigdata\/task-teams\/privacy\/guide\/2023_UN%20PET%20Guide.pdf"},{"key":"1_CR27","unstructured":"Weitenberg, E.: Secure and private statistics with distributed Paillier (2021). https:\/\/medium.com\/applied-mpc\/secure-and-private-statistics-with-distributed-paillier-8a186410b5af"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Sharing in a Digital World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57978-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T06:05:51Z","timestamp":1724738751000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57978-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031579776","9783031579783"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57978-3_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip-summerschool.github.io","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}