Addressing Privacy: Matching User Requirements with Implementation Techniques

نویسندگان

  • Evangelia Kavakli
  • Christos Kalloniatis
  • Stefanos Gritzalis
چکیده

-The paper considers the basic privacy requirements namely anonymity, pseudonimity, unlinkability and unobservability and how these requirements can be linked with related system implementation techniques thus guiding design decisions during system development.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting privacy in system design: the electronic voting case

Purpose – The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requirements engineering methodology which, incorporates privacy requirements in the system design process and to demonstrate its applicability in an e-voting case. Design/methodology/approach – PriS provides a methodological framework for addressing privacy-related issues during system development. It p...

متن کامل

Privacy-preserving Digital Identity Management for Cloud Computing

Digital identity management services are crucial in cloud computing infrastructures to authenticate users and to support flexible access control to services, based on user identity properties (also called attributes) and past interaction histories. Such services should preserve the privacy of users, while at the same time enhancing interoperability across multiple domains and simplifying manage...

متن کامل

Security and Privacy Requirements Analysis within a Social Setting

Security issues for software systems ultimately concern relationships among social actors stakeholders, system users, potential attackers and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent-oriented requirements modeling language. The framework supports a set of analysis techniques. In p...

متن کامل

AREA: A cross-application notification service for groupware

This paper presents AREA, an integrated synchronous and asynchronous notification service for awareness information. AREA uses a semantic model of the client applications to support cross-application awareness. The service is based on the dichotomy of interest and privacy Notifications of user activities are a function of relevance in the current work situation and the privacy requirements of t...

متن کامل

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005