Symposia Journal Edition 01/2011

Page 42

01/2011

Cloud Computing Science About Eva Schlehahn

Assessorin jur. Eva Schlehahn has studied law at the University of Bremen in Germany and passed a specialist solicitor training in IT law. She is now working as a legal counsellor for the data protection authority of SchleswigHolstein “Unabhaengiges Landeszentrum fuer Datenschutz Schleswig-Holsten” (Engl. “Independent Centre for Privacy Protection Schleswig-Holstein”), Germany. There she is active in legal research for the TClouds project; her tasks encompass the analysis of legal privacy and data protection requirements and the evaluation of the project results with regard to these requirements.

About Marit Hansen

Marit Hansen is Deputy Privacy & Information Commissioner of Land Schleswig-Holstein, Germany, and Deputy Chief of Unabhaengiges Landeszentrum fuer Datenschutz (ULD). Within ULD she is in charge of the “Privacy Enhancing Technologies (PET)” Division and the “Innovation Centre Privacy & Security”. Since her diploma in computer science in 1 995 she has been working on security and privacy aspects especially concerning anonymity, pseudonymity, identity management, biometrics, multilateral security, and e-privacy from both the technical and the legal perspectives. In several projects she and her team actively participate in technology design in order to support PET and give feedback on legislation.

Online Sources

[1 ] Article 29 Data Protection Working Party: Opinion 4/2007 on the concept of personal data, WP1 36, http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2007/wp1 36_en.pdf [2] Galexia Study: The US Safe Harbor – Fact or Fiction? (December 2008) http://www.galexia.com/public/about/news/about_news-id1 43.html [3] Resolution of the supreme supervisory authorities for data protection in the non-public sector (Duesseldorfer Kreis) about Safe Harbor (link to PDF file): http://www.datenschutzberlin.de/attachments/71 0/Resolution_DuesseldorfCircle_28_04_201 0EN.pdf?1 28531 61 29 [4] Kelly: A Cloudbook for the Cloud, 2007, http://www.kk.org/thetechnium/archives/2007/11 /a_cloudbook_for.php [5] Cachin/Haas/Vukolić: Dependable Storage in the Intercloud, Research Report RZ 3783, IBM Research – Zurich, October 201 0, http://domino.research.ibm.com/library/cyberdig.nsf/papers/630549C46339936C852577C200291 E78/$Fil e/rz3783.pdf [6] Verissimo et al.: Intrusion-Resilient Middleware Design and Validation, in: Information Assurance, Security and Privacy Services, pp. 61 5-678, 2009 [7] Shraer et al.: Venus: Verification for Untrusted Coud Storage, in: Proc. Workshop on Cloud Computing Security ACM, 201 0 42

SymposiaJournal


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.