A Privacy Manager for Collaborative Working Environments

被引:2
作者
Allison, David S. [1 ,2 ,3 ,4 ]
Capretz, Miriam A. M. [1 ]
Tazi, Said [2 ,4 ]
机构
[1] Univ Western Ontario, Dept Elect & Comp Engn, London, ON, Canada
[2] CNRS, F-31400 Toulouse, France
[3] Univ Toulouse 1, LAAS, F-31042 Toulouse, France
[4] Univ Toulouse 1, UTI Capitole, F-31042 Toulouse, France
来源
2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE) | 2013年
关键词
privacy; collaborative working environment; privacy ontology; privacy policy;
D O I
10.1109/WETICE.2013.23
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability to collaborate has long been key to the successful completion of tasks. With the availability of current networking and computing power, the creation of Collaborative Working Environments (CWEs) has allowed for this process to occur over virtually any geographic distance. While the strength of a CWE is its ability to allow for the exchange of information freely between collaborators, this opens the participants up to a possible loss of privacy. In this paper, the issue of protecting privacy while collaborating is discussed. To address the privacy concerns that are raised, a generic privacy ontology is presented, along with a Collaborative Privacy Manager (CPM). The generic privacy ontology allows for the creation of privacy policies at several layers of granularity. The architecture of the CPM, consisting of several levels and modules, is introduced. The functions this CPM will play to ensure privacy in collaborative working environments are also detailed. How each module within the Collaborative Working Environment works towards accomplishing each goal is described.
引用
收藏
页码:110 / 116
页数:7
相关论文
共 14 条
  • [1] Allison D., 2012, J SOFTWARE ENG APPL, V5, P200, DOI DOI 10.4236/JSEA.2012.53026
  • [2] Anthonysamy P., 2012, P 1 WORKSH PRIV SEC, P51
  • [3] Cavoukian A., 2002, PRIVACY PAYOFF SUCCE
  • [4] Cranor Lorrie, 2002, The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
  • [5] Phishing for user security awareness
    Dodge, Ronald C., Jr.
    Carver, Curtis
    Ferguson, Aaron J.
    [J]. COMPUTERS & SECURITY, 2007, 26 (01) : 73 - 80
  • [6] Hayes C., 2012, SOCIAL SCI RES NETWO
  • [7] Hong D., 2005, PROC 7 INT C HUMAN C, P1
  • [8] Horrocks I., 2004, W3C Member submission, V21, P1
  • [9] IMAGINE Project, 2012, IMAGINE INN END TO E
  • [10] Collaborative privacy management
    Kolter, Jan
    Kernchen, Thomas
    Pernul, Guenther
    [J]. COMPUTERS & SECURITY, 2010, 29 (05) : 580 - 591