Abstract:
A computer network has a number of resources. One or more trusted localisation provider certifies the location of the resources. Encrypted data is closely associated with a policy package defining privacy policies for the data and metapolicies for their selection. A trusted privacy service enforces the privacy policies. The trusted privacy service is arranged to supply a key to a resource to allow that resource to process data if the trusted privacy service determines from the trusted localisation provider certifying the location and other contextual information of the resource that the privacy policy allows processing of the data on that resource in that location.
Abstract:
A method purchasing insurance is provided , the method comprising the steps of entering into a contract of insurance with the insurer based solely on the generalised identity (perhaps created for that particular purpose) that is associated with selected policy attributes (possibly generalised to ranges etc.) or statements that the user's attributes satisfy a policy, such that other attributes, including the real identity of the user, remain unknown to the insurer. The degree of which information is withheld or generalised is based on an assessment of the trustworthiness of the insurer's computer system.