Embedding privacy in IT applications development

被引:6
|
作者
Gritzalis, Dimitris A. [1 ]
机构
[1] Department of Informatics, Athens Univ. Economics and Business, Athens Greece DPC of Greece, Athens
来源
Information Management and Computer Security | 2004年 / 12卷 / 01期
关键词
Computers; Data security; Privacy;
D O I
10.1108/09685220410518801
中图分类号
学科分类号
摘要
A considerable research stream in information systems security has elaborated several propositions as to how privacy and anonymity can be protected, the most prominent of which make use of encryption and digital signing. Since privacy protection is a persistent topic in most electronically performed activities, the icreasing popularity of Internet has driven researchers to approach privacy protection in a holistic way. As a result, privacy-enhancing technologies have been put forth, aiming at protecting users against privacy and anonymity threats and vulnerabilities. Nowadays, that privacy protection has to be incorporated in most IT applications is one of the least controversial statements. This paper describes Privacy Protector, a technological means for enhancing privacy in an IT application development process. Privacy Protector comprises of a set of software services that have been built upon generic, privacy-focused user requirements. The paper also describes an API that can be used for incorporating Privacy Protector in the development framework of an IT application.
引用
收藏
页码:8 / 26
页数:18
相关论文
共 50 条
  • [31] Towards Design and Development of a Data Security and Privacy Risk Management Framework for WBAN Based Healthcare Applications
    Paul, Pangkaj Chandra
    Loane, John
    McCaffery, Fergal
    Regan, Gilbert
    APPLIED SYSTEM INNOVATION, 2021, 4 (04)
  • [32] Engineering privacy requirements in business intelligence applications
    Chiasera, Annamaria
    Casati, Fabio
    Daniel, Florian
    Velegrakis, Yannis
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 219 - 228
  • [33] PRADroid: Privacy Risk Assessment for Android Applications
    Yang, Yang
    Du, Xuehui
    Yang, Zhi
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 90 - 95
  • [34] Privacy and Ethics Are Fundamental to Tech Development: A Privacy Regulator's Perspective
    Clayton, Jill
    Sibbald, Scott
    INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2020, 28
  • [35] Privacy, security and resilience in mobile healthcare applications
    Lin, Wenjun
    Xu, Ming
    He, Jingyi
    Zhang, Wenjun
    ENTERPRISE INFORMATION SYSTEMS, 2023, 17 (03)
  • [36] Examining the Privacy Vulnerability Level of Android Applications
    Kapitsaki, Georgia M.
    Ioannou, Modestos
    WEBIST: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2019, : 34 - 45
  • [37] Security and Privacy of mHealth Applications: A Scoping Review
    Nurgalieva, Leysan
    O'Callaghan, David
    Doherty, Gavin
    IEEE ACCESS, 2020, 8 : 104247 - 104268
  • [38] The law of genetic privacy: applications, implications, and limitations
    Clayton, Ellen Wright
    Evans, Barbara J.
    Hazel, James W.
    Rothstein, Mark A.
    JOURNAL OF LAW AND THE BIOSCIENCES, 2019, 6 (01): : 1 - 36
  • [39] Examining the Privacy and Security of Mobile Refugee Applications
    Zirillo, Marc
    Aviza, Shannon
    Cruz, Marlon
    Lee, Halie
    LaMalva, Grace
    Galvez, Amanda
    Dragos, Denise
    Schmeelk, Suzanna
    INTELLIGENT COMPUTING, VOL 4, 2024, 2024, 1019 : 410 - 427
  • [40] Fractional biometrics: safeguarding privacy in biometric applications
    Bayly, Duncan
    Castro, Maurice
    Arakala, Arathi
    Jeffers, Jason
    Horadam, Kathy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (01) : 69 - 82