Proceedings of the Third ACM Conference on Data and Application Security and Privacy 2013
DOI: 10.1145/2435349.2435361
|View full text |Cite
|
Sign up to set email alerts
|

Privacy by design

Abstract: The privacy by design approach has already been applied in different areas. We believe that the next challenge in this area today is to go beyond individual cases and to provide methodologies to explore the design space in a systematic way. As a first step in this direction, we focus in this paper on the data minimization principle and consider different options using decentralized architectures in which actors do not necessarily trust each other. We propose a framework to express the parameters to be taken in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(3 citation statements)
references
References 43 publications
(54 reference statements)
0
3
0
Order By: Relevance
“…This is consistent with the multidimensionality of the privacy concept that needs to be evaluated in different social, organizational and technical contexts [9]. Few proposals provide a set of guidelines or privacy requirements with which to assess privacy in particular systems [70], and very few proposal use a formal language to analyze the extent to which privacy requirements are implemented in a software system [75] [67].…”
Section: Specific Privacy Principlesmentioning
confidence: 56%
See 2 more Smart Citations
“…This is consistent with the multidimensionality of the privacy concept that needs to be evaluated in different social, organizational and technical contexts [9]. Few proposals provide a set of guidelines or privacy requirements with which to assess privacy in particular systems [70], and very few proposal use a formal language to analyze the extent to which privacy requirements are implemented in a software system [75] [67].…”
Section: Specific Privacy Principlesmentioning
confidence: 56%
“…Figure 6 shows the number of citations of the most mentioned goals, classified by category of study. [83], [47], [35], [42], [70], [71], [67], [39], [75], [62], [66], [49], [68], [69], [72], [51], [52], [59], [73], [74], [41], [44], [56], [54], [55], [53]…”
Section: Rq2 What Privacy Goals Have Been Addressed In the Developmementioning
confidence: 99%
See 1 more Smart Citation