Revocable privacy: Principles, use cases, and technologies

Wouter Lueks*, Maarten H. Everts, Jaap Henk Hoepman

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)


Security and privacy often seem to be at odds with one another. In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences for people who do violate the rule. We first improve the definition of revocable privacy by considering different types of sensors for users’ actions and different types of consequences of violating the rules (for example blocking). Second, we explore some use cases that can benefit from a revocable privacy approach. For each of these, we derive the underlying abstract rule that users should follow. Finally, we describe existing techniques that can implement some of these abstract rules. These descriptions not only illustrate what can already be accomplished using revocable privacy, they also reveal directions for future research.

Original languageEnglish
Title of host publicationPrivacy Technologies and Policy
Subtitle of host publicationThird Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers
EditorsDaniel Le Metayer, Bettina Berendt, Thomas Engel, Demosthenes Ikonomou, Stefan Schiffner
Place of PublicationCham
Number of pages20
ISBN (Electronic)978-3-319-31456-3
ISBN (Print)978-3-319-31455-6
Publication statusPublished - 2016
Externally publishedYes
Event3rd Annual Privacy Forum, APF 2015 - Luxembourg, Luxembourg
Duration: 7 Oct 20158 Oct 2015
Conference number: 3

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference3rd Annual Privacy Forum, APF 2015
Abbreviated titleAPF 2015


  • n/a OA procedure


Dive into the research topics of 'Revocable privacy: Principles, use cases, and technologies'. Together they form a unique fingerprint.

Cite this