Embedding privacy in IT applications development

被引:6
|
作者
Gritzalis, Dimitris A. [1 ]
机构
[1] Department of Informatics, Athens Univ. Economics and Business, Athens Greece DPC of Greece, Athens
来源
Information Management and Computer Security | 2004年 / 12卷 / 01期
关键词
Computers; Data security; Privacy;
D O I
10.1108/09685220410518801
中图分类号
学科分类号
摘要
A considerable research stream in information systems security has elaborated several propositions as to how privacy and anonymity can be protected, the most prominent of which make use of encryption and digital signing. Since privacy protection is a persistent topic in most electronically performed activities, the icreasing popularity of Internet has driven researchers to approach privacy protection in a holistic way. As a result, privacy-enhancing technologies have been put forth, aiming at protecting users against privacy and anonymity threats and vulnerabilities. Nowadays, that privacy protection has to be incorporated in most IT applications is one of the least controversial statements. This paper describes Privacy Protector, a technological means for enhancing privacy in an IT application development process. Privacy Protector comprises of a set of software services that have been built upon generic, privacy-focused user requirements. The paper also describes an API that can be used for incorporating Privacy Protector in the development framework of an IT application.
引用
收藏
页码:8 / 26
页数:18
相关论文
共 50 条
  • [1] Embedding Privacy First Human Centric in User Experience for Mobile Applications
    Phokela, Kanchanjot Kaur
    Singi, Kapil
    Kaulgud, Vikrant
    PROCEEDINGS OF THE 17TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, ISEC 2024, 2024,
  • [2] Embedding Privacy Into Design Through Software Developers: Challenges & Solutions
    Tahaei, Mohammad
    Vaniea, Kami
    Rashid, Awais
    IEEE SECURITY & PRIVACY, 2023, 21 (01) : 49 - 57
  • [3] Privacy in Distributed Commercial Applications
    Kuntze, Nicolai
    Rudolph, Carsten
    WHAT KIND OF INFORMATION SOCIETY? GOVERNANCE, VIRTUALITY, SURVEILLANCE, SUSTAINABILITY, RESILIENCE, 2010, 328 : 214 - 224
  • [4] Privacy tradeoffs in smartphone applications
    Savage, Scott J.
    Waldman, Donald M.
    ECONOMICS LETTERS, 2015, 137 : 171 - 175
  • [5] Privacy in the Smart City-Applications, Technologies, Challenges, and Solutions
    Eckhoff, David
    Wagner, Isabel
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 489 - 516
  • [6] Privacy protection for HealthGrid applications
    Claerhout, B
    De Moor, GJE
    METHODS OF INFORMATION IN MEDICINE, 2005, 44 (02) : 140 - 143
  • [7] PrivFR: Privacy-Enhanced Federated Recommendation With Shared Hash Embedding
    Zhang, Honglei
    Zhou, Xin
    Shen, Zhiqi
    Li, Yidong
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2025, 36 (01) : 32 - 46
  • [8] Adversarial Privacy-Preserving Graph Embedding Against Inference Attack
    Li, Kaiyang
    Luo, Guangchun
    Ye, Yang
    Li, Wei
    Ji, Shihao
    Cai, Zhipeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6904 - 6915
  • [9] Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes
    Zhang, Bo
    Xu, Heng
    ACM CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW 2016), 2016, : 1676 - 1690
  • [10] Privacy Mechanism for Applications in Cloud Computing
    Paredes, L. N. G.
    Zorzo, S. D.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (01) : 1402 - 1407