2019 IEEE Security and Privacy Workshops (SPW) 2019
DOI: 10.1109/spw.2019.00028
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Aware V-Model for Software Development

Abstract: After the adoption of new data protection regulations, like GDPR, proper treatment of privacy throughout the system development lifecycle has become a must. In this paper, we discuss several aspects to more easily and effectively integrate privacy engineering in system development and how to bring the notion of privacy-by-design into practice. We propose the new W-model as a privacy-aware extension of the V-model frequently used in software engineering. One stage of the Wmodel deals with analyzing privacy in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Integration and changes are mostly ignored, even by those works that acknowledge the existence of services or iterative methodologies. The most sophisticated treatment of integration is the requirement on privacy technologies to be "integrable" and "compatible" by Al-Momani et al [17]. However, integrable in this paper is not related to actual integration of services but to whether the PET offers the functionality and performance needed in the system.…”
Section: Risks/ Threatsmentioning
confidence: 94%
See 2 more Smart Citations
“…Integration and changes are mostly ignored, even by those works that acknowledge the existence of services or iterative methodologies. The most sophisticated treatment of integration is the requirement on privacy technologies to be "integrable" and "compatible" by Al-Momani et al [17]. However, integrable in this paper is not related to actual integration of services but to whether the PET offers the functionality and performance needed in the system.…”
Section: Risks/ Threatsmentioning
confidence: 94%
“…Goaloriented Academic publications Hoepman [51] Deng et al [39] Spiekermann and Cranor [93] De Metayer [36] Hansen et al [49] Gürses et al [45], [46] Al-Momani et al [17] Bernsmed [24] Liu et al [65] Kalloniatis et al [57] Kung [62] Danezis et al [35] Standards ISO/IEC TR 27550 [15] OASIS PMRM [13] OASIS [28] NISTIR 8062 [14] PRIPARE [73] of scope for our analysis. We also excluded works that focus only on threat modeling and risk analysis as these are complementary to engineering activities (could be a subset) but are not sufficient as an engineering methodology.…”
Section: Risks/ Threatsmentioning
confidence: 99%
See 1 more Smart Citation