2009
DOI: 10.1007/978-3-642-02843-4_7
|View full text |Cite
|
Sign up to set email alerts
|

A Data Privacy Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(70 citation statements)
references
References 4 publications
0
60
0
Order By: Relevance
“…However before moving toward AES-RS model, we must introduce briefly the common models of location servers (LS) that are being used in LBS system [27], [28], 30]. These models are assorted into three basic categories including Untrusted Location Server (ULS), Trusted Location Server (TLS) and Peer to Peer based network (P2P) [29] where each model consist of three components as Mobile User Devices, Location Server and clients. In basic scenario each client interact with location server for desired POI or location finding, Location server further contact with clients to get the requested position.…”
Section: Aes-rs System Modelmentioning
confidence: 99%
“…However before moving toward AES-RS model, we must introduce briefly the common models of location servers (LS) that are being used in LBS system [27], [28], 30]. These models are assorted into three basic categories including Untrusted Location Server (ULS), Trusted Location Server (TLS) and Peer to Peer based network (P2P) [29] where each model consist of three components as Mobile User Devices, Location Server and clients. In basic scenario each client interact with location server for desired POI or location finding, Location server further contact with clients to get the requested position.…”
Section: Aes-rs System Modelmentioning
confidence: 99%
“…Based on the taxonomy, Wu et al (Wu et al, 2010) asserted that privacy policies are formed by four elements: purpose, visibility, granularity and retention (of the data). However, despite adaptation, this taxonomy was still primarily aimed at providing a means for thinking about data privacy technologically (and specifically for data repositories) (Barker et al, 2009), opposed to legally. The taxonomy elements were created from principles of handling data from various sources, rather than from concrete legal requirements.…”
Section: Comparative Analysis Of Privacy Policiesmentioning
confidence: 99%
“…According to a thorough analysis by Wicker and Schrader [11], privacy can be defined as the right of an individual's control over personal information. More formally this is defined by Barker et al [12] in a four dimensional privacy taxonomy. The dimensions are purpose, visibility, granularity and retention.…”
Section: B Privacymentioning
confidence: 99%
“…Furthermore, relationships on the business layer and data properties such as encryption are taken into account. The following, discriminative set of classifiers is used to determine potential threats: first, for each information object the data provider and the data collector are determined (according to the terminology defined in [12]) and it is assessed who has access to the data. This yields a list of three-tuples in the form information object (IO), data provider (DP), data collector (DC) .…”
Section: Pattern Matchingmentioning
confidence: 99%