2015 IEEE Security and Privacy Workshops 2015
DOI: 10.1109/spw.2015.13
|View full text |Cite
|
Sign up to set email alerts
|

Protection Goals for Privacy Engineering

Abstract: Six protection goals provide a common scheme for addressing the legal, technical, economic, and societal dimensions of privacy and data protection in complex IT systems. In this paper, each of these is analyzed for state of the art in implementation, existing techniques and technologies, and future research indications.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
95
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 102 publications
(101 citation statements)
references
References 32 publications
0
95
0
Order By: Relevance
“…In this paper, we consider the generation of privacy requirements related to the protection goals for privacy engineering proposed by Hansen [5]. These protection goals include the classical security goals confidentiality, integrity, and availability and the privacy goals unlinkability, transparency, and intervenability.…”
Section: Overview Of Our Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we consider the generation of privacy requirements related to the protection goals for privacy engineering proposed by Hansen [5]. These protection goals include the classical security goals confidentiality, integrity, and availability and the privacy goals unlinkability, transparency, and intervenability.…”
Section: Overview Of Our Methodsmentioning
confidence: 99%
“…We consider the six protection goals for privacy engineering unlinkability, transparency, intervenability, confidentiality, integrity, and availability proposed by Hansen et al [5]. Hansen et al state that the protection goal of unlinkability includes further properties such as anonymity, pseudonymity, and undetectability.…”
Section: Generate Privacy Requirements Candidatesmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors conclude that "privacy by design should be approached less from a 'code' perspective, but rather from the perspective of 'communication' strategies". In this regard, there are privacy design strategies like the proposed by Deng et al [17], Hoepman [22], Heurix et al [23], or Hansen et al [24] that consider privacy and data protection principles from the beginning of the development process.…”
Section: Related Workmentioning
confidence: 99%
“…technologies that make use of privacy design strategies [15] or consider protection goals for privacy engineering [13]). Compared to a denition that restricts PETs to data minimisation, this approach provides greater exibility and adaptability, albeit adds complexity when statements on the privacy enhancement properties in various categories have to be elaborated.…”
Section: Privacy-enhancing Technologymentioning
confidence: 99%