2011 Sixth International Conference on Availability, Reliability and Security 2011
DOI: 10.1109/ares.2011.97
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Verification Using Ontologies

Abstract: Abstract-As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a comprehensive approach for privacy requirement engineering, implementation, and verification is largely missing. This paper extends current design methods by additional (formal) steps which take advantage of ontolog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 13 publications
(11 reference statements)
0
16
0
Order By: Relevance
“…An ontology framework based on the PbD approach [23] consists of nine base ontologies, eight domain ontologies and four application specific ontologies. Another interesting approach is presented in [30].…”
Section: Related Workmentioning
confidence: 99%
“…An ontology framework based on the PbD approach [23] consists of nine base ontologies, eight domain ontologies and four application specific ontologies. Another interesting approach is presented in [30].…”
Section: Related Workmentioning
confidence: 99%
“…In combination with application modularization, CANE and its features can reduce the risk of potential privacy leaks in distributed ITS applications. Therefore, CANE can be used to support, and be integrated with, a privacy-aware design process for ITS applications [20], [21].…”
Section: Discussionmentioning
confidence: 99%
“…Figure 6 shows the number of citations of the most mentioned goals, classified by category of study. [83], [47], [35], [42], [70], [71], [67], [39], [75], [62], [66], [49], [68], [69], [72], [51], [52], [59], [73], [74], [41], [44], [56], [54], [55], [53]…”
Section: Rq2 What Privacy Goals Have Been Addressed In the Developmementioning
confidence: 99%