Abstract. Existing work on privacy by design mostly focus on tech-nologies rather than methodologies and on components rather than ar-chitectures. In this paper, we advocate the idea that privacy by design should also be addressed at the architectural level and be associated with suitable methodologies. Among other benefits, architectural descriptions enable a more systematic exploration of the design space. In addition, because privacy is intrinsically a complex notion that can be in tension with other requirements, we believe that formal methods should play a key role in this area. After presenting our position, we provide some hints on how our approach can turn into practice based on ongoing work on a privacy by design environment.
The Privacy-by-Design approach has gained an increasing acceptance for privacy management in the pri...
Part 2: Full PapersInternational audienceIn this paper, we describe a multi-step approach to privacy...
The Privacy-by-Design approach has gained an increasing acceptance for privacy management in the pri...
International audienceExisting work on privacy by design mostly focus on technologies rather than me...
This paper analyses how ITS applications may embrace a privacy-by-design approach. We take a holisti...
A wide array of Privacy-Enhancing Technologies (PETs) have been proposed as technical measures to pr...
Privacy by Design has emerged as a proactive, integrative, and creative approach for embedding priva...
Abstract. Privacy violations are one of the main problems encountered in technology-enhanced environ...
Man's needs has different component such as physiological, psychological and sociological needs. Pr...
Privacy violations are one of the main problems encountered in technology-enhanced environments. In ...
International audienceIn systems design, we generally distinguish the architecture and the protocol ...
Privacy is a multi-faceted concept that has several aspects. It is subjective in nature, not least b...
The privacy by design approach has already been put into practice in different application areas. We...
Purpose: The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and t...
In this report, we describe a multi-stage approach for privacy by design. The main design step is th...
The Privacy-by-Design approach has gained an increasing acceptance for privacy management in the pri...
Part 2: Full PapersInternational audienceIn this paper, we describe a multi-step approach to privacy...
The Privacy-by-Design approach has gained an increasing acceptance for privacy management in the pri...
International audienceExisting work on privacy by design mostly focus on technologies rather than me...
This paper analyses how ITS applications may embrace a privacy-by-design approach. We take a holisti...
A wide array of Privacy-Enhancing Technologies (PETs) have been proposed as technical measures to pr...
Privacy by Design has emerged as a proactive, integrative, and creative approach for embedding priva...
Abstract. Privacy violations are one of the main problems encountered in technology-enhanced environ...
Man's needs has different component such as physiological, psychological and sociological needs. Pr...
Privacy violations are one of the main problems encountered in technology-enhanced environments. In ...
International audienceIn systems design, we generally distinguish the architecture and the protocol ...
Privacy is a multi-faceted concept that has several aspects. It is subjective in nature, not least b...
The privacy by design approach has already been put into practice in different application areas. We...
Purpose: The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and t...
In this report, we describe a multi-stage approach for privacy by design. The main design step is th...
The Privacy-by-Design approach has gained an increasing acceptance for privacy management in the pri...
Part 2: Full PapersInternational audienceIn this paper, we describe a multi-step approach to privacy...
The Privacy-by-Design approach has gained an increasing acceptance for privacy management in the pri...