Embedding privacy in IT applications development

被引:6
|
作者
Gritzalis, Dimitris A. [1 ]
机构
[1] Department of Informatics, Athens Univ. Economics and Business, Athens Greece DPC of Greece, Athens
来源
Information Management and Computer Security | 2004年 / 12卷 / 01期
关键词
Computers; Data security; Privacy;
D O I
10.1108/09685220410518801
中图分类号
学科分类号
摘要
A considerable research stream in information systems security has elaborated several propositions as to how privacy and anonymity can be protected, the most prominent of which make use of encryption and digital signing. Since privacy protection is a persistent topic in most electronically performed activities, the icreasing popularity of Internet has driven researchers to approach privacy protection in a holistic way. As a result, privacy-enhancing technologies have been put forth, aiming at protecting users against privacy and anonymity threats and vulnerabilities. Nowadays, that privacy protection has to be incorporated in most IT applications is one of the least controversial statements. This paper describes Privacy Protector, a technological means for enhancing privacy in an IT application development process. Privacy Protector comprises of a set of software services that have been built upon generic, privacy-focused user requirements. The paper also describes an API that can be used for incorporating Privacy Protector in the development framework of an IT application.
引用
收藏
页码:8 / 26
页数:18
相关论文
共 50 条
  • [21] The interpersonal privacy identity (IPI): development of a privacy as control model
    Tabitha L. James
    Quinton Nottingham
    Stephane E. Collignon
    Merrill Warkentin
    Jennifer L. Ziegelmayer
    Information Technology and Management, 2016, 17 : 341 - 360
  • [22] The interpersonal privacy identity (IPI): development of a privacy as control model
    James, Tabitha L.
    Nottingham, Quinton
    Collignon, Stephane E.
    Warkentin, Merrill
    Ziegelmayer, Jennifer L.
    INFORMATION TECHNOLOGY & MANAGEMENT, 2016, 17 (04) : 341 - 360
  • [23] Understanding Privacy Online: Development of a Social Contract Approach to Privacy
    Kirsten Martin
    Journal of Business Ethics, 2016, 137 : 551 - 569
  • [24] Development of Privacy Design Patterns Based on Privacy Principles and UML
    Suphakul, Theeraporn
    Senivongse, Twittie
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 369 - 375
  • [26] Sensor-level Security and Privacy Protection by embedding Video Content Analysis
    Winkler, Thomas
    Rinner, Bernhard
    2013 18TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2013,
  • [27] Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
    Ari, Ado Adamou Abba
    Ngangmo, Olga Kengni
    Titouna, Chafiq
    Thiare, Ousmane
    Kolyang
    Mohamadou, Alidou
    Gueroui, Abdelhak Mourad
    APPLIED COMPUTING AND INFORMATICS, 2024, 20 (1/2) : 119 - 141
  • [28] Privacy Issues in Smartphone Applications: An Analysis of Headache/Migraine Applications
    Minen, Mia T.
    Stieglitz, Eric J.
    Sciortino, Rose
    Torous, John
    HEADACHE, 2018, 58 (07): : 1014 - 1027
  • [29] Privacy-Preserving Image Watermark Embedding Method Based on Edge Computing
    Cheng, Hang
    Huang, Qinjian
    Chen, Fei
    Wang, Meiqing
    Yan, Wanxi
    IEEE ACCESS, 2022, 10 : 18570 - 18582
  • [30] Privacy-Preserving Network Embedding Against Private Link Inference Attacks
    Han, Xiao
    Yang, Yuncong
    Wang, Leye
    Wu, Junjie
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 847 - 859