2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) 2018
DOI: 10.1109/icdcs.2018.00157
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Privacy Risks in Distributed Data Services: A Model-Driven Approach

Abstract: Abstract-Online services are becoming increasingly datacentric; they collect, process, analyze and anonymously disclose growing amounts of personal data. It is crucial that such systems are engineered in a privacy-aware manner in order to satisfy both the the privacy requirements of the user, and the legal privacy regulations that the system operates under. How can system developers be better supported to create privacy-aware systems and help them to understand and identify privacy risks? Model-Driven Engineer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…A refinement approach for the reuse of privacy risk analysis results Identifying privacy risks in distributed data services: A model-driven approach [69] iii. In the validation category, studies critically assess a proposed solution, whether by the authors themselves or other researchers, for example, through comparative analyses or other forms of rigorous scrutiny (e.g., experiments, simulation, prototyping, mathematical analysis), without actually evaluating it in practice.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…A refinement approach for the reuse of privacy risk analysis results Identifying privacy risks in distributed data services: A model-driven approach [69] iii. In the validation category, studies critically assess a proposed solution, whether by the authors themselves or other researchers, for example, through comparative analyses or other forms of rigorous scrutiny (e.g., experiments, simulation, prototyping, mathematical analysis), without actually evaluating it in practice.…”
Section: Resultsmentioning
confidence: 99%
“…Given this, we state that such methods can be considered comprehensive in eliciting privacy requirements. However, S39 [69] only covers two privacy properties. In addition, we assessed the methodologies in terms of privacy measures.…”
Section: Scope and Focusmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section we provide a formal model of user privacy that is generated based upon the input data-flow diagrams (we do not detail the transformation algorithm in this paper, see [9]). User privacy is modeled in terms of how actor actions on personal data change the user's state of privacy.…”
Section: Step 2: Automatically Generating An Lts Privacy Modelmentioning
confidence: 99%