Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social transactions. Such data sets require special consideration since they may convey personal data, sensitive personal data,...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1017 |
---|---|
container_issue | |
container_start_page | 1009 |
container_title | |
container_volume | |
creator | Kalloniatis, C. Kavakli, E. Gritzalis, S. |
description | In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social transactions. Such data sets require special consideration since they may convey personal data, sensitive personal data, employee data, credit card data etc. Recent surveys have shown that people feel that their privacy is at risk from identity theft and erosion of individual rights. The result is that privacy violation is becoming an increasingly critical issue in modern societies. To this end, PriS, a new security requirements engineering methodology, has been introduced aiming to incorporate privacy requirements early in the system development process. In this paper, we extend the PriS conceptual framework by introducing privacy process patterns as a way for describing the effect of privacy requirements on business processes. In addition, privacy process patterns facilitate the identification of the system architecture that best supports the privacy-related business processes, thus providing a holistic approach from business goals to `privacy-compliant' IT systems |
doi_str_mv | 10.1109/ARES.2007.156 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4159903</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4159903</ieee_id><sourcerecordid>4159903</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-1079e2e672462f04c0072d26a4a2faf68e75e92415eccebf9d4f07431763162b3</originalsourceid><addsrcrecordid>eNpNj81KAzEYRQMiKHWWrtzkBWbMfybLUqsWCpbWrkua-VIjTqYmUejbO1AF7-ZsDgcuQreUNJQScz9dzzcNI0Q3VKoLVBndEq2MZFrL9gpVOb-TcdzwlvNr1G1ziAe8SuHbutPIwUHOeGVLgRQz9kPCi-iGdBySLf_VNXx-hQQ9xJJxiGXA5Q3w5pQL9PgBcjjEv9wNuvT2I0P1ywnaPs5fZ8_18uVpMZsu60C1LDUl2gADpZlQzBPhxhesY8oKy7z1qgUtwTBBJTgHe2864YkWnGrFqWJ7PkF3524AgN0xhd6m0270jSGc_wDmyVTb</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kalloniatis, C. ; Kavakli, E. ; Gritzalis, S.</creator><creatorcontrib>Kalloniatis, C. ; Kavakli, E. ; Gritzalis, S.</creatorcontrib><description>In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social transactions. Such data sets require special consideration since they may convey personal data, sensitive personal data, employee data, credit card data etc. Recent surveys have shown that people feel that their privacy is at risk from identity theft and erosion of individual rights. The result is that privacy violation is becoming an increasingly critical issue in modern societies. To this end, PriS, a new security requirements engineering methodology, has been introduced aiming to incorporate privacy requirements early in the system development process. In this paper, we extend the PriS conceptual framework by introducing privacy process patterns as a way for describing the effect of privacy requirements on business processes. In addition, privacy process patterns facilitate the identification of the system architecture that best supports the privacy-related business processes, thus providing a holistic approach from business goals to `privacy-compliant' IT systems</description><identifier>ISBN: 9780769527758</identifier><identifier>ISBN: 0769527752</identifier><identifier>DOI: 10.1109/ARES.2007.156</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Computer architecture ; Cultural differences ; Data privacy ; Data security ; Global communication ; Informatics ; Positron emission tomography ; Protection ; Software systems</subject><ispartof>The Second International Conference on Availability, Reliability and Security (ARES'07), 2007, p.1009-1017</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4159903$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4159903$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kalloniatis, C.</creatorcontrib><creatorcontrib>Kavakli, E.</creatorcontrib><creatorcontrib>Gritzalis, S.</creatorcontrib><title>Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process</title><title>The Second International Conference on Availability, Reliability and Security (ARES'07)</title><addtitle>ARES</addtitle><description>In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social transactions. Such data sets require special consideration since they may convey personal data, sensitive personal data, employee data, credit card data etc. Recent surveys have shown that people feel that their privacy is at risk from identity theft and erosion of individual rights. The result is that privacy violation is becoming an increasingly critical issue in modern societies. To this end, PriS, a new security requirements engineering methodology, has been introduced aiming to incorporate privacy requirements early in the system development process. In this paper, we extend the PriS conceptual framework by introducing privacy process patterns as a way for describing the effect of privacy requirements on business processes. In addition, privacy process patterns facilitate the identification of the system architecture that best supports the privacy-related business processes, thus providing a holistic approach from business goals to `privacy-compliant' IT systems</description><subject>Communication system security</subject><subject>Computer architecture</subject><subject>Cultural differences</subject><subject>Data privacy</subject><subject>Data security</subject><subject>Global communication</subject><subject>Informatics</subject><subject>Positron emission tomography</subject><subject>Protection</subject><subject>Software systems</subject><isbn>9780769527758</isbn><isbn>0769527752</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpNj81KAzEYRQMiKHWWrtzkBWbMfybLUqsWCpbWrkua-VIjTqYmUejbO1AF7-ZsDgcuQreUNJQScz9dzzcNI0Q3VKoLVBndEq2MZFrL9gpVOb-TcdzwlvNr1G1ziAe8SuHbutPIwUHOeGVLgRQz9kPCi-iGdBySLf_VNXx-hQQ9xJJxiGXA5Q3w5pQL9PgBcjjEv9wNuvT2I0P1ywnaPs5fZ8_18uVpMZsu60C1LDUl2gADpZlQzBPhxhesY8oKy7z1qgUtwTBBJTgHe2864YkWnGrFqWJ7PkF3524AgN0xhd6m0270jSGc_wDmyVTb</recordid><startdate>200704</startdate><enddate>200704</enddate><creator>Kalloniatis, C.</creator><creator>Kavakli, E.</creator><creator>Gritzalis, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200704</creationdate><title>Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process</title><author>Kalloniatis, C. ; Kavakli, E. ; Gritzalis, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-1079e2e672462f04c0072d26a4a2faf68e75e92415eccebf9d4f07431763162b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Communication system security</topic><topic>Computer architecture</topic><topic>Cultural differences</topic><topic>Data privacy</topic><topic>Data security</topic><topic>Global communication</topic><topic>Informatics</topic><topic>Positron emission tomography</topic><topic>Protection</topic><topic>Software systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Kalloniatis, C.</creatorcontrib><creatorcontrib>Kavakli, E.</creatorcontrib><creatorcontrib>Gritzalis, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kalloniatis, C.</au><au>Kavakli, E.</au><au>Gritzalis, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process</atitle><btitle>The Second International Conference on Availability, Reliability and Security (ARES'07)</btitle><stitle>ARES</stitle><date>2007-04</date><risdate>2007</risdate><spage>1009</spage><epage>1017</epage><pages>1009-1017</pages><isbn>9780769527758</isbn><isbn>0769527752</isbn><abstract>In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social transactions. Such data sets require special consideration since they may convey personal data, sensitive personal data, employee data, credit card data etc. Recent surveys have shown that people feel that their privacy is at risk from identity theft and erosion of individual rights. The result is that privacy violation is becoming an increasingly critical issue in modern societies. To this end, PriS, a new security requirements engineering methodology, has been introduced aiming to incorporate privacy requirements early in the system development process. In this paper, we extend the PriS conceptual framework by introducing privacy process patterns as a way for describing the effect of privacy requirements on business processes. In addition, privacy process patterns facilitate the identification of the system architecture that best supports the privacy-related business processes, thus providing a holistic approach from business goals to `privacy-compliant' IT systems</abstract><pub>IEEE</pub><doi>10.1109/ARES.2007.156</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769527758 |
ispartof | The Second International Conference on Availability, Reliability and Security (ARES'07), 2007, p.1009-1017 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4159903 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Communication system security Computer architecture Cultural differences Data privacy Data security Global communication Informatics Positron emission tomography Protection Software systems |
title | Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T20%3A40%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Using%20Privacy%20Process%20Patterns%20for%20Incorporating%20Privacy%20Requirements%20into%20the%20System%20Design%20Process&rft.btitle=The%20Second%20International%20Conference%20on%20Availability,%20Reliability%20and%20Security%20(ARES'07)&rft.au=Kalloniatis,%20C.&rft.date=2007-04&rft.spage=1009&rft.epage=1017&rft.pages=1009-1017&rft.isbn=9780769527758&rft.isbn_list=0769527752&rft_id=info:doi/10.1109/ARES.2007.156&rft_dat=%3Cieee_6IE%3E4159903%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4159903&rfr_iscdi=true |