A System of Privacy Paerns for User Control
نویسندگان
چکیده
Privacy by Design is prescribed by the new European General Data Protection Regulation. Geing this privacy preserving design philosophy appropriately adopted is a challenge, however. One natural approach to this challenge would be to leverage design paerns in the privacy domain. However, privacy paerns are scattered, unrelated, inconsistent, and immature. is paper presents a paern system for user control, which is built upon an existing privacy paern catalog. By ensuring implementability and uniformity within descriptions, and establishing relationships using consistent terminology, we alleviate some of the aforementioned issues.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملAnalysis the privacy statement of the American Public Libraries and provide privacy statement for public libraries in Iran
Aim: The purpose of this study was to review the privacy statement of the American top public libraries and provide privacy statement for users of public libraries in Iran. Method: The research method is a combination of descriptive survey and Delphi library. The research community consisted of 25 American public libraries based on the rankings of the American Library Association's libraries. T...
متن کاملRepeated Record Ordering for Constrained Size Clustering
One of the main techniques used in data mining is data clustering, which has many applications in computer science, biology, and social sciences. Constrained clustering is a type of clustering in which side information provided by the user is incorporated into current clustering algorithms. One of the well researched constrained clustering algorithms is called microaggregation. In a microaggreg...
متن کاملHeuristic Evaluation of Picture Archiving and Communication Systems (PACS)
Introduction: Poor User Interface design can be one of the probable reasons of users’ error and reduced incentive in using health information systems such as PACS. Heuristic evaluation is one the methods for assuring the proper user interface design of health information systems such as PACS. Method: This study was a descriptive-analytic research conducted in 2019 through using Nielsen usabilit...
متن کامل