
Max-R. UlbrichtTechnische Universität Berlin | TUB · Information Systems Engineering
Max-R. Ulbricht
Diplom
About
17
Publications
1,688
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
139
Citations
Citations since 2017
Introduction
Max-R. Ulbricht currently works at the Information Systems Engineering Research Group, Technische Universität Berlin.
Publications
Publications (17)
Transparency – the provision of information about what personal data is collected for which purposes, how long it is stored, or to which parties it is transferred – is one of the core privacy principles underlying regulations such as the GDPR. Technical approaches for implementing transparency in practice are, however, only rarely considered. In th...
Transparency - the provision of information about what personal data is collected for which purposes, how long it is stored, or to which parties it is transferred - is one of the core privacy principles underlying regulations such as the GDPR. Technical approaches for implementing transparency in practice are, however, only rarely considered. In th...
Faulty access control in API-based multi-service setups can lead to violations of consent declarations through unauthorized Third Parties. This threatens Service Providers to lose the trust of their Service Consumers and to be exposed to sensitive fines as defined by the GDPR. Addressing this problem, in this paper, we propose a novel, blockchain-b...
In this paper, we propose an architecturally novel approach to im- plementing purpose-based access control in practice. Different from previous proposals, our approach resides on the application instead of the data(base) layer. This allows for significantly better inte- gration with established architectures and practices of real-world application...
Technische Verfahren zur Formulierung datenschutzrechtlicher Einwilligungen sind für die praktische Ausgestaltung des IoT unverzichtbar. Die hier vorgestellten Mechanismen orientieren sich explizit an den durch die DSGVO gegebenen rechtlichen Anforderungen sowie an den technischen Gegebenheiten des IoT. Auf dieser Basis lassen sich praxis-taugliche...
In this paper, we present YaPPL—a Privacy Preference Language explicitly designed to fulfill consent-related requirements of the GDPR as well as to address technical givens of IoT scenarios. We analyze what criteria consent must meet in order to be legally sufficient and translate these into a formal representation of consent as well as into functi...
This paper discusses the general characteristics of the mobile instant messaging market from a competition point of view. Positive feedback and indirect network effects, which strongly influence the mobile instant messaging market, tend to facilitate the development of one quasi-monopoly. Even after several years of market maturation, however, no m...
If citizens actively participate in the process of collecting empirical data, as a key element of empirically oriented scientific projects, this can be seen as a contribution to an open and citizen-oriented science. Such
participation can be supported by providing technical tools. The paper therefore presents examples of participatory sensing as th...
Bei Nutzung neuer Informations- und Kommunikationstechnologien ergeben sich Herausforderungen bezüglich informationeller Selbstbestimmung, da etablierte Prinzipien neu bewertet werden müssen. Anhand eines konkreten Szenarios werden rechtliche und technische Problemfelder bei der Nutzung von Big Data-Technologien aufgezeigt, um ein Konzept zur techn...
One of the aims of technology assessment is to inform policy makers about possible future developments of technology, about their likelihood, and about the most probable impacts on individuals as well as on the fabric of society. Such information could be used to plan and create adequate regulations to minimize negative and maximize positive effect...
In this paper, we describe a novel approach to the privacy problem that photos showing persons are often “meddle-shared” by others online. We introduce a set of four elementary privacy preferences a photo subject can have. These preferences are represented by corresponding symbols – “Offlinetags” – which can be worn in the form of stickers or badge...
This chapter shall analyze the options users of online social networks like Facebook have to adjust privacy settings. As the theoretical background of this evaluation, an institutional economics point of view shall be applied. Against this background, the following analysis of how Facebook as a provider of an online social network designs its platf...