Proceedings of the 12th International Conference on Availability, Reliability and Security 2017
DOI: 10.1145/3098954.3104054
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Model of User-centered Privacy Preservation

Abstract: The growth in cloud-based services tailored for users means more and more personal data is being exploited, and with this comes the need to better handle user privacy. Software technologies concentrating on privacy preservation typically present a one-size fits all solution. However, users have different viewpoints of what privacy means to them and therefore, configurable and dynamic privacy preserving solutions have the potential to create useful and tailored services without breaching any user's privacy. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…Extensible access control markup language (XACML) standards include both access control (authorisation) and data management based on XML in the different systems [25]. Effectively, XACML offers features for data access and authorisation for the users at the fine-grained level, which is the most flexible and effective [26,27,28]. This technology is presented by the organization for the advancement of structured information standards (OASIS).…”
Section: Overview Of Security and Privacy Techniques In Ehr Systemsmentioning
confidence: 99%
“…Extensible access control markup language (XACML) standards include both access control (authorisation) and data management based on XML in the different systems [25]. Effectively, XACML offers features for data access and authorisation for the users at the fine-grained level, which is the most flexible and effective [26,27,28]. This technology is presented by the organization for the advancement of structured information standards (OASIS).…”
Section: Overview Of Security and Privacy Techniques In Ehr Systemsmentioning
confidence: 99%
“…An important aspect of this project is to provide a simple privacy dashboard for end users, allowing them to control their privacy settings in their regularly used platforms. A tool called PlusPrivacy [2] has been launched as a web or smart phone app as part of the OPERANDO project, which allows users to specify their privacy preferences in online social networks, for purposes such as blocking ads, malware, tracker, unwanted apps or extensions, and hiding their email identities [24].…”
Section: Related Workmentioning
confidence: 99%
“…Hence, a user's privacy changes if any of their personal data has been or can be identified by an actor. Prior models following this approach are: a Finite State Machine (FSM) [10,11] or a Labelled Transition System (LTS) [12]. The common theme in both is that the user's privacy at any point in time is represented by a state, and that actions, executed by actors, taken on their personal data can change this state.…”
Section: Step 2: Automatically Generating An Lts Privacy Modelmentioning
confidence: 99%
“…As they control more aspects of the system than just pseudonymization, for a more detailed description refer to literature describing the system overall [12]. These policies, which are derived from information obtained from a questionnaire, have three main aspects:…”
Section: Step 3: Considering User Privacy Preferencesmentioning
confidence: 99%