A System of Privacy Paerns for User Control

نویسندگان

  • Michael Colesky
  • Julio C. Caiza
  • José M. Del Álamo
  • Jaap-Henk Hoepman
چکیده

Privacy by Design is prescribed by the new European General Data Protection Regulation. GeŠing this privacy preserving design philosophy appropriately adopted is a challenge, however. One natural approach to this challenge would be to leverage design paŠerns in the privacy domain. However, privacy paŠerns are scattered, unrelated, inconsistent, and immature. Œis paper presents a paŠern system for user control, which is built upon an existing privacy paŠern catalog. By ensuring implementability and uniformity within descriptions, and establishing relationships using consistent terminology, we alleviate some of the aforementioned issues.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Analysis the privacy statement of the American Public Libraries and provide privacy statement for public libraries in Iran

Aim: The purpose of this study was to review the privacy statement of the American top public libraries and provide privacy statement for users of public libraries in Iran. Method: The research method is a combination of descriptive survey and Delphi library. The research community consisted of 25 American public libraries based on the rankings of the American Library Association's libraries. T...

متن کامل

Repeated Record Ordering for Constrained Size Clustering

One of the main techniques used in data mining is data clustering, which has many applications in computer science, biology, and social sciences. Constrained clustering is a type of clustering in which side information provided by the user is incorporated into current clustering algorithms. One of the well researched constrained clustering algorithms is called microaggregation. In a microaggreg...

متن کامل

Heuristic Evaluation of Picture Archiving and Communication Systems (PACS)

Introduction: Poor User Interface design can be one of the probable reasons of users’ error and reduced incentive in using health information systems such as PACS. Heuristic evaluation is one the methods for assuring the proper user interface design of health information systems such as PACS. Method: This study was a descriptive-analytic research conducted in 2019 through using Nielsen usabilit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017