Embedding privacy in IT applications development

被引:6
|
作者
Gritzalis, Dimitris A. [1 ]
机构
[1] Department of Informatics, Athens Univ. Economics and Business, Athens Greece DPC of Greece, Athens
来源
Information Management and Computer Security | 2004年 / 12卷 / 01期
关键词
Computers; Data security; Privacy;
D O I
10.1108/09685220410518801
中图分类号
学科分类号
摘要
A considerable research stream in information systems security has elaborated several propositions as to how privacy and anonymity can be protected, the most prominent of which make use of encryption and digital signing. Since privacy protection is a persistent topic in most electronically performed activities, the icreasing popularity of Internet has driven researchers to approach privacy protection in a holistic way. As a result, privacy-enhancing technologies have been put forth, aiming at protecting users against privacy and anonymity threats and vulnerabilities. Nowadays, that privacy protection has to be incorporated in most IT applications is one of the least controversial statements. This paper describes Privacy Protector, a technological means for enhancing privacy in an IT application development process. Privacy Protector comprises of a set of software services that have been built upon generic, privacy-focused user requirements. The paper also describes an API that can be used for incorporating Privacy Protector in the development framework of an IT application.
引用
收藏
页码:8 / 26
页数:18
相关论文
共 50 条
  • [41] Problematic Privacy Policies of Voice Assistant Applications
    Liao, Song
    Wilson, Christin
    Long, Cheng
    Hu, Hongxin
    Deng, Huixing
    IEEE SECURITY & PRIVACY, 2021, 19 (06) : 66 - 73
  • [42] Automatic Detection for Privacy Violations in Android Applications
    Luo, Qian
    Yu, Yinbo
    Liu, Jiajia
    Benslimane, Abderrahim
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6159 - 6172
  • [43] A Comparison of Chat Applications in Terms of Security and Privacy
    Botha, Johnny
    Van't Wout, Carien
    Leenen, Louise
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 55 - 62
  • [44] Student Perceptions of Their Privacy in Leaning Analytics Applications
    Arnold, Kimberly E.
    Sclater, Niall
    SEVENTH INTERNATIONAL LEARNING ANALYTICS & KNOWLEDGE CONFERENCE (LAK'17), 2017, : 66 - 69
  • [45] Privacy of Fitness Applications and Consent Management in Blockchain
    Alhajri, May
    Shahraki, Ahmad Salehi
    Rudolph, Carsten
    2022 AUSTRALIAN COMPUTER SCIENCE WEEK (ACSW 2022), 2022, : 65 - 73
  • [46] Functionalities as superior predictor of applications privacy threats
    De Santo, Alessio
    Quiquerez, Brice
    Gaspoz, Cedric
    NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2016, 444 : 263 - 274
  • [47] Design and Evaluation of a Privacy Architecture for Crowdsensing Applications
    Perez, Alfredo J.
    Zeadally, Sherali
    APPLIED COMPUTING REVIEW, 2018, 18 (01): : 7 - 18
  • [48] Locality and Privacy in People-Nearby Applications
    Toch, Eran
    Levi, Inbal
    UBICOMP'13: PROCEEDINGS OF THE 2013 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, 2013, : 539 - 548
  • [49] Security and privacy for innovative automotive applications: A survey
    Van Huynh Le
    den Hartog, Jerry
    Zannone, Nicola
    COMPUTER COMMUNICATIONS, 2018, 132 : 17 - 41
  • [50] Privacy, Security and Interoperability of Mobile Health Applications
    Jones, Josette F.
    Hook, Sara A.
    Park, Seong C.
    Scott, Lasha M.
    UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION: CONTEXT DIVERSITY, PT 3, 2011, 6767 : 46 - 55