2017 11th International Conference on Research Challenges in Information Science (RCIS) 2017
DOI: 10.1109/rcis.2017.7956571
|View full text |Cite
|
Sign up to set email alerts
|

A framework managing conflicts between security and privacy requirements

Abstract: A thesis submitted in partial fulfilment of the requirements of the University of Brighton for the degree of Doctor of Philosophy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 124 publications
0
8
0
Order By: Relevance
“…This research is an extension of the study conducted by Alkubaisy et al[1] -which itself is a continuation of earlier studies[2,3] and aims to aid the reader in comprehensively grasping the concepts laid out.…”
mentioning
confidence: 85%
See 1 more Smart Citation
“…This research is an extension of the study conducted by Alkubaisy et al[1] -which itself is a continuation of earlier studies[2,3] and aims to aid the reader in comprehensively grasping the concepts laid out.…”
mentioning
confidence: 85%
“…Based on the motivation example, we will illustrate the security and privacy requirements, following the phases of the ConfIS framework to resolve conflicts, using the extended supported tool. The first phase aims to map the security and privacy requirements [2]. This assumes the existence of a matrix to find out the potential conflicts between security and privacy requirements, based on our recent study [18].…”
Section: Motivation Scenariomentioning
confidence: 99%
“…Besides, we now live in an unrivaled and growing hyper connected world that there is a clear awareness of the magnitude of privacy issues that must be rigorously addressed in the different fields [21,18,36], where people are increasingly sensitive to their privacy and firm about the handling of their private data [16,31,38]. Thus, conflicting security requirements and privacy issues gain more attention from researchers in the last years [4,3,27] and should be taken into account when designing a security solution.…”
Section: Toward Public Key Systems Aggregationmentioning
confidence: 99%
“…However, conflicts are discussed on the conceptual level, abstracting from concrete systems, while we show that the specific conflicts arising in a system can be identified by analyzing the data system's minimization and security requirements. The perspective papers of Ganji et al [27] and Alkubaisy [5] highlight the importance of detecting conflicts between security and privacy requirements, specifically for dataminimization requirements. Both papers discuss the components required for a potential approach, however, without providing a complete solution.…”
Section: Conflicts Between Data-protection Requirementsmentioning
confidence: 99%