Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019
DOI: 10.1145/3297280.3297431
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-enhanced system design modeling based on privacy features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
8

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 20 publications
0
4
0
8
Order By: Relevance
“…Finalmente, en Ahmadian et al (2019) se propone un método para modelar sistemas que mejoran la privacidad basado en elementos llamados características de privacidad (privacy features) que incluyen estrategias y subestrategias de diseño, los patrones de privacidad y las PETS (Privacy enhancing technologytecnologías para el fortalecimiento de la privacidad). En este proceso, se determina un conjunto de características de privacidad que luego se integra en el modelo inicial de un sistema para producir una versión respetuosa con la privacidad.…”
Section: Rq1 ¿Qué Metodologías De Diseño Respetuosas Con Launclassified
“…Finalmente, en Ahmadian et al (2019) se propone un método para modelar sistemas que mejoran la privacidad basado en elementos llamados características de privacidad (privacy features) que incluyen estrategias y subestrategias de diseño, los patrones de privacidad y las PETS (Privacy enhancing technologytecnologías para el fortalecimiento de la privacidad). En este proceso, se determina un conjunto de características de privacidad que luego se integra en el modelo inicial de un sistema para producir una versión respetuosa con la privacidad.…”
Section: Rq1 ¿Qué Metodologías De Diseño Respetuosas Con Launclassified
“…However, LINDDUN is missing assessment steps from a legal perspective and also is not integrated with a risk assessment process [21]. The work in [28] presents a methodology, firstly introduced in [24], to reinforce the privacy enhancement of a system design model, since there is a luck of a common a methodology concerning the design of IT systems [24]. More precisely, a systematic model-based cost estimation methodology is proposed that takes into consideration a range of privacy controls, including privacy-design strategies, patterns, and PETs as well as the interrelations and dependencies among them.…”
Section: Understanding the Differences Between Pias And The Gdpr's Dpiasmentioning
confidence: 99%
“…In contrast, approaches for enforcing data-usage policies [19,62] focus on the enforcement mechanism, making the policy statement implementation dependent and hence not a design artifact. Finally, there are approaches that do not propose any technical means for achieving privacyby-design, but rather report on experiences [39], analyze regulations [6], or exclusively work with system design models [5].…”
Section: Introductionmentioning
confidence: 99%