2017 11th International Conference on Research Challenges in Information Science (RCIS) 2017
DOI: 10.1109/rcis.2017.7956536
|View full text |Cite
|
Sign up to set email alerts
|

Supporting the design of privacy-aware business processes via privacy process patterns

Abstract: Abstract-Privacy is an increasingly important concern for modern software systems which handle personal and sensitive user information. Privacy by design has been established in order to highlight the path to be followed during a system's design phase ensuring the appropriate level of privacy for the information it handles. Nonetheless, transitioning between privacy concerns identified early during the system's design phase, and privacy implementing technologies to satisfy such concerns at the later developmen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
27
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(27 citation statements)
references
References 29 publications
0
27
0
Order By: Relevance
“…Diamantopoulou et al [19] provide a set of privacy process patterns for security and data-minimization concepts, aiming to provide predefined solutions for different types of privacy concerns in the implementation phase. In addition to the textual description of the patterns, BPMN design patterns were provided to guide operationalization at the business process level.…”
Section: Data-minimization-aware Approachesmentioning
confidence: 99%
“…Diamantopoulou et al [19] provide a set of privacy process patterns for security and data-minimization concepts, aiming to provide predefined solutions for different types of privacy concerns in the implementation phase. In addition to the textual description of the patterns, BPMN design patterns were provided to guide operationalization at the business process level.…”
Section: Data-minimization-aware Approachesmentioning
confidence: 99%
“…For example, if a user should be required to access a service using their alias, then it conflicts with the general concept of Anonymity. However, if some aspects supplement or overlap concerning requirements, then they cannot be considered as conflicts [14]. Confidentiality, Integrity, and Anonymity, which are different aspects but ultimately strive towards the same goal of protecting data against unauthorized tampering, do not conflict with each other.…”
Section: ) Privacy Requirementsmentioning
confidence: 99%
“…Software systems dealing with sensitive and personal user data are facing critical roadblocks regarding the issue of maintaining high level of effective data privacy in recent times [1]. In any information system, privacy and confidentiality are the basic security goals to be taken into consideration.…”
Section: Introductionmentioning
confidence: 99%
“…[2]. In spite of its importance, the issue of privacy is oftentimes taken as an afterthought, mainly because of insufficient expertise/awareness among system designers and developers [1]. Security requirements may bypass the foundational goals of privacy if privacy requirements are not implemented with enough clarity [2].…”
Section: Introductionmentioning
confidence: 99%