Addressing Privacy: Matching User Requirements with Implementation Techniques
نویسندگان
چکیده
-The paper considers the basic privacy requirements namely anonymity, pseudonimity, unlinkability and unobservability and how these requirements can be linked with related system implementation techniques thus guiding design decisions during system development.
منابع مشابه
Protecting privacy in system design: the electronic voting case
Purpose – The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requirements engineering methodology which, incorporates privacy requirements in the system design process and to demonstrate its applicability in an e-voting case. Design/methodology/approach – PriS provides a methodological framework for addressing privacy-related issues during system development. It p...
متن کاملPrivacy-preserving Digital Identity Management for Cloud Computing
Digital identity management services are crucial in cloud computing infrastructures to authenticate users and to support flexible access control to services, based on user identity properties (also called attributes) and past interaction histories. Such services should preserve the privacy of users, while at the same time enhancing interoperability across multiple domains and simplifying manage...
متن کاملSecurity and Privacy Requirements Analysis within a Social Setting
Security issues for software systems ultimately concern relationships among social actors stakeholders, system users, potential attackers and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent-oriented requirements modeling language. The framework supports a set of analysis techniques. In p...
متن کاملAREA: A cross-application notification service for groupware
This paper presents AREA, an integrated synchronous and asynchronous notification service for awareness information. AREA uses a semantic model of the client applications to support cross-application awareness. The service is based on the dichotomy of interest and privacy Notifications of user activities are a function of relevance in the current work situation and the privacy requirements of t...
متن کاملimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005