2016
DOI: 10.1007/978-3-319-47072-6_15
|View full text |Cite
|
Sign up to set email alerts
|

PRIAM: A Privacy Risk Analysis Methodology

Abstract: PRIAM: Un cadre d'analyse de risques d'atteintes à la vie privée Résumé : La nécessité de conduire une analyse d'impact (PIA) avant tout déploiement de système ou de service informatique présentant des risques potentiels d'atteinte à la vie privée est désormais reconnue. Les analyses d'impact sur les données personnelles deviendront d'ailleurs obligatoires pour certaines catégories de produits quand le nouveau règlement européen sur la protection des données personnelles entrera en vigueur. L'analyse des risqu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
63
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 35 publications
(64 citation statements)
references
References 19 publications
0
63
0
Order By: Relevance
“…Our approach is inspired by previous works on PRA [12][13][14], [16,17], [36] while introducing three analysis levels to enhance reusability: Phase 1 (Generic PRA) takes as inputs the specification and the generic components of the system and yields generic privacy harm trees. This phase has to be carried out only once for a given category of products, regardless of their architectures or deployment context.…”
Section: General Approachmentioning
confidence: 99%
See 4 more Smart Citations
“…Our approach is inspired by previous works on PRA [12][13][14], [16,17], [36] while introducing three analysis levels to enhance reusability: Phase 1 (Generic PRA) takes as inputs the specification and the generic components of the system and yields generic privacy harm trees. This phase has to be carried out only once for a given category of products, regardless of their architectures or deployment context.…”
Section: General Approachmentioning
confidence: 99%
“…This phase has to be carried out only once for a given category of products, regardless of their architectures or deployment context. Its main steps are [12]:…”
Section: General Approachmentioning
confidence: 99%
See 3 more Smart Citations