2006
DOI: 10.1007/11914853_63
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…In a few years, nevertheless, this gap has begun to be filled by work on privacy [31], universal usability [32], informed consent [33], crime control [34,35], social justice [36], self-enforcement technologies [37], and more. Not surprisingly, today there is a variety of design approaches to data protection [6][7][8][9][10][11][12][13][14][15][16][17]: design may shape places or products, spaces or processes, to decrease the impact of harm-generating conducts or, alternatively, to encourage the change of social behavior.…”
Section: The Design Of Legal Frameworkmentioning
confidence: 99%
See 3 more Smart Citations
“…In a few years, nevertheless, this gap has begun to be filled by work on privacy [31], universal usability [32], informed consent [33], crime control [34,35], social justice [36], self-enforcement technologies [37], and more. Not surprisingly, today there is a variety of design approaches to data protection [6][7][8][9][10][11][12][13][14][15][16][17]: design may shape places or products, spaces or processes, to decrease the impact of harm-generating conducts or, alternatively, to encourage the change of social behavior.…”
Section: The Design Of Legal Frameworkmentioning
confidence: 99%
“…After all, work in legal ontologies allows us to quantify the growing amount of personal data processed in compliance with legal frameworks: This is what occurs with research in the management of information systems [8,41], support of privacy preservation in location-based services [9], or middleware architectures for data protection [10], each of which aims at integrating smaller parts and sub-solutions of the design project. Interestingly, there are cases where the conceptualization of classes, relations, properties, and instances pertaining to a given problem domain, does not seem particularly complex, e.g., the design of information systems for hospitals to ensure that patient names are kept separated from data on medical treatments or health status.…”
Section: Legal Ontologiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Our approach is a solution for multi-agent systems which uses [1] and [9]. Agent domain ontology and agent security ontology usage for access control has been combined and used with a general platform-independent XACML policy set.…”
Section: Related Workmentioning
confidence: 99%