The last years have seen a peak in privacy related research. The focus has been mostly on how to protect the individual from being tracked, with plenty of anonymizing solutions.We advocate another model that is closer to the “physical” world: we consider our privacy respected when our personal data is used for the purpose for which we gave it in the first place.Essentially, in any distributed authorization protocol, credentials should mention their purpose beside their powers. For this information to be meaningful we should link it to the functional requirements of the original application.We sketch how one can modify a requirement engineering methodology to incorporate security concerns so that we explicitly trace back the high-level goals...
Security and privacy are requirements that keep gaining importance in today's information-driven wor...
As privacy becomes a major concern for consumers and enterprises, many research have been focused o...
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing ...
The last years have seen a peak in privacy related research. The focus has been mostly on how to pro...
The last years have seen a peak in privacy related research. The focus has been mostly on how to pro...
There is often a misalignment between requirements for keeping data owners' information private and ...
Achieving privacy preservation in a data-sharing computing envi-ronment is becoming a challenging pr...
Privacy has never been an explicit goal of authorization mechanisms. The tradi-tional approach to au...
Data purpose is a central concept to modeling privacy requirements for information systems. Existing...
Software systems are increasingly more and more open, handle large amounts of personal or other sens...
One of the principles of privacy management is making use of purposes for indicating why data is sto...
The advent of the information age has brought a proliferation in the amount of information that is a...
Data purpose is a central concept to modeling privacy requirements for information systems. Existing...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
Abstract—This paper proposes a trust involved management framework for supporting privacy preserving...
Security and privacy are requirements that keep gaining importance in today's information-driven wor...
As privacy becomes a major concern for consumers and enterprises, many research have been focused o...
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing ...
The last years have seen a peak in privacy related research. The focus has been mostly on how to pro...
The last years have seen a peak in privacy related research. The focus has been mostly on how to pro...
There is often a misalignment between requirements for keeping data owners' information private and ...
Achieving privacy preservation in a data-sharing computing envi-ronment is becoming a challenging pr...
Privacy has never been an explicit goal of authorization mechanisms. The tradi-tional approach to au...
Data purpose is a central concept to modeling privacy requirements for information systems. Existing...
Software systems are increasingly more and more open, handle large amounts of personal or other sens...
One of the principles of privacy management is making use of purposes for indicating why data is sto...
The advent of the information age has brought a proliferation in the amount of information that is a...
Data purpose is a central concept to modeling privacy requirements for information systems. Existing...
This paper proposes a purpose-based framework for supporting privacy preserving access control polic...
Abstract—This paper proposes a trust involved management framework for supporting privacy preserving...
Security and privacy are requirements that keep gaining importance in today's information-driven wor...
As privacy becomes a major concern for consumers and enterprises, many research have been focused o...
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing ...