메뉴 건너뛰기




Volumn , Issue , 2015, Pages 159-166

Protection goals for privacy engineering

Author keywords

Availability; Confidentiality; Data protection; Integrity; Intervenability; Privacy; Protection goals; Research challenges; Transparency; Unlinkability

Indexed keywords

AVAILABILITY; SECURITY OF DATA; TRANSPARENCY;

EID: 84945946726     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SPW.2015.13     Document Type: Conference Paper
Times cited : (112)

References (56)
  • 1
    • 79957981304 scopus 로고    scopus 로고
    • Datenschutz-schutzziele-revisited
    • M. Rost and A. Pfitzmann, "Datenschutz-Schutzziele-revisited," Datenschutz und Datensicherheit, vol. 33, no. 6, pp. 353-358, 2009.
    • (2009) Datenschutz und Datensicherheit , vol.33 , Issue.6 , pp. 353-358
    • Rost, M.1    Pfitzmann, A.2
  • 2
    • 84945944391 scopus 로고    scopus 로고
    • Privacy by design and the new protection goals
    • M. Rost and K. Bock, "Privacy by Design and the New Protection Goals," EuroPriSe Whitepaper, 2011. [Online]. Available: https://www. european-privacy-seal.eu/results/articles/BockRost-PbD-DPG-en.pdf
    • (2011) EuroPriSe Whitepaper
    • Rost, M.1    Bock, K.2
  • 3
    • 84865521711 scopus 로고    scopus 로고
    • Top 10 mistakes in system design from a privacy perspective and privacy protection goals
    • Springer, IFIP International Federation for Information Processing
    • M. Hansen, "Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals," in Privacy and Identity for Life, ser. IFIP AICT, vol. 375, IFIP International Federation for Information Processing. Springer, 2012, pp. 14-31.
    • (2012) Privacy and Identity for Life, Ser. IFIP AICT , vol.375 , pp. 14-31
    • Hansen, M.1
  • 4
    • 84945908211 scopus 로고    scopus 로고
    • Privacy and data protection by design-from policy to engineering
    • G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. Le Métayer, R. Tirtea, and S. Schiffner, "Privacy and Data Protection by Design-from policy to engineering," ENISA, Tech. Rep., 2014. [Online]. Available: http: //www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/ privacy-and-data-protection-by-design/at download/fullReport
    • (2014) ENISA, Tech. Rep.
    • Danezis, G.1    Domingo-Ferrer, J.2    Hansen, M.3    Hoepman, J.-H.4    Le Métayer, D.5    Tirtea, R.6    Schiffner, S.7
  • 5
    • 84908657937 scopus 로고    scopus 로고
    • The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR
    • J. Kokott and C. Sobotta, "The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR," International Data Privacy Law, vol. 3, no. 4, pp. 222-228, 2013.
    • (2013) International Data Privacy Law , vol.3 , Issue.4 , pp. 222-228
    • Kokott, J.1    Sobotta, C.2
  • 7
    • 0004126353 scopus 로고    scopus 로고
    • Multilateral security: Enabling technologies and their evaluation
    • R. Wilhelm, Ed. Springer
    • A. Pfitzmann, "Multilateral Security: Enabling Technologies and Their Evaluation," in Informatics-10 Years Back, 10 Years Ahead, ser. LNCS, R. Wilhelm, Ed., vol. 2000. Springer, 2001, pp. 50-62.
    • (2001) Informatics-10 Years Back, 10 Years Ahead, Ser. LNCS , vol.2000 , pp. 50-62
    • Pfitzmann, A.1
  • 9
    • 0033717446 scopus 로고    scopus 로고
    • Properties of protection goals and their integration into a user interface
    • May
    • G. Wolf and A. Pfitzmann, "Properties of protection goals and their integration into a user interface," Comput. Netw., vol. 32, no. 6, pp. 685-699, May 2000. [Online]. Available: http://dx.doi.org/10.1016/ S1389-1286(00)00029-3
    • (2000) Comput. Netw. , vol.32 , Issue.6 , pp. 685-699
    • Wolf, G.1    Pfitzmann, A.2
  • 15
    • 33646364568 scopus 로고    scopus 로고
    • Freedom of information and openness: Fundamental human rights?
    • P. Birkinshaw, "Freedom of Information and Openness: Fundamental Human Rights?" Administrative Law Review, vol. 58, no. 1, pp. 177-218, 2006. [Online]. Available: http://www.jstor.org/stable/40712007
    • (2006) Administrative Law Review , vol.58 , Issue.1 , pp. 177-218
    • Birkinshaw, P.1
  • 16
    • 84886483953 scopus 로고    scopus 로고
    • DepSky: Dependable and secure storage in a cloud-of-clouds
    • A. N. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, "DepSky: Dependable and Secure Storage in a Cloud-of-Clouds," TOS, vol. 9, no. 4, p. 12, 2013.
    • (2013) TOS , vol.9 , Issue.4 , pp. 12
    • Bessani, A.N.1    Correia, M.2    Quaresma, B.3    André, F.4    Sousa, P.5
  • 19
    • 84875822474 scopus 로고    scopus 로고
    • Unique in the crowd: The privacy bounds of human mobility
    • Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, "Unique in the crowd: The privacy bounds of human mobility," in Sci. Rep. 3,1376, 2013, pp. 1-5.
    • (2013) Sci. Rep. , vol.3 , Issue.1376 , pp. 1-5
    • De Montjoye, Y.-A.1    Hidalgo, C.A.2    Verleysen, M.3    Blondel, V.D.4
  • 23
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • A. C.-C. Yao, "Protocols for secure computations," in FOCS, vol. 82, 1982, pp. 160-164.
    • (1982) FOCS , vol.82 , pp. 160-164
    • Yao, A.C.-C.1
  • 24
  • 25
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • Nov.
    • B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, Nov. 1998. [Online]. Available: http://doi.acm.org/10.1145/293347.293350
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 27
    • 80053153641 scopus 로고    scopus 로고
    • Towards privacy-preserving XML transformation
    • M. Jensen and F. Kerschbaum, "Towards privacy-preserving XML transformation," in ICWS, 2011, pp. 65-72.
    • (2011) ICWS , pp. 65-72
    • Jensen, M.1    Kerschbaum, F.2
  • 28
    • 84866638283 scopus 로고    scopus 로고
    • Fully anonymous attribute tokens from lattices
    • J. Camenisch, G. Neven, and M. Rückert, "Fully anonymous attribute tokens from lattices," in SCN, 2012, pp. 57-75.
    • (2012) SCN , pp. 57-75
    • Camenisch, J.1    Neven, G.2    Rückert, M.3
  • 29
    • 84945905464 scopus 로고    scopus 로고
    • Cryptographic primitives for building secure and privacy respecting protocols
    • J. Camenisch, "Cryptographic primitives for building secure and privacy respecting protocols," in ACM Conference on Computer and Communications Security, 2011, pp. 361-362.
    • (2011) ACM Conference on Computer and Communications Security , pp. 361-362
    • Camenisch, J.1
  • 30
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for nontransferable anonymous credentials with optional anonymity revocation
    • J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation," in EUROCRYPT, 2001, pp. 93-118.
    • (2001) EUROCRYPT , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 34
    • 84885643619 scopus 로고    scopus 로고
    • Towards privacy-friendly transparency services in interorganizational business processes
    • M. Jensen, "Towards privacy-friendly transparency services in interorganizational business processes," in Computer Software and Applications Conference Workshops (COMPSACW), 2013, pp. 200-205.
    • (2013) Computer Software and Applications Conference Workshops (COMPSACW) , pp. 200-205
    • Jensen, M.1
  • 36
    • 84924243206 scopus 로고    scopus 로고
    • Ph. D. dissertation, Karlstad University, Department of Computer Science
    • T. Pulls, "Privacy-preserving transparency-enhancing tools," Ph.D. dissertation, Karlstad University, Department of Computer Science, 2012.
    • (2012) Privacy-preserving Transparency-enhancing Tools
    • Pulls, T.1
  • 37
    • 84865486754 scopus 로고    scopus 로고
    • Transparency tools
    • J. Camenisch, S. Fischer-Hübner, and K. Rannenberg, Eds Springer
    • H. Hedbom, T. Pulls, and M. Hansen, "Transparency tools," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, and K. Rannenberg, Eds. Springer, 2011, pp. 135-143.
    • (2011) Privacy and Identity Management for Life , pp. 135-143
    • Hedbom, H.1    Pulls, T.2    Hansen, M.3
  • 39
    • 84945902781 scopus 로고    scopus 로고
    • October, Privacy by Design Resolution. 27-29 October 2010, Jerusalem, Israel
    • 32nd International Conference of Data Protection and Privacy Commissioners. (2010, October) Privacy by Design Resolution. 27-29 October 2010, Jerusalem, Israel. [Online]. Available: http: //www.ipc.on.ca/site documents/pbd-resolution.pdf
    • (2010) 32nd International Conference of Data Protection and Privacy Commissioners
  • 40
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The pris method
    • Aug
    • C. Kalloniatis, E. Kavakli, and S. Gritzalis, "Addressing Privacy Requirements in System Design: The PriS Method," Requir. Eng., vol. 13, no. 3, pp. 241-255, Aug. 2008.
    • (2008) Requir. Eng. , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 41
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • Mar
    • M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements," Requir. Eng., vol. 16, no. 1, pp. 3-32, Mar. 2011.
    • (2011) Requir. Eng. , vol.16 , Issue.1 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 44
    • 84945912916 scopus 로고    scopus 로고
    • Standardisierte datenschutzmodellierung
    • M. Rost, "Standardisierte Datenschutzmodellierung," DuD-Datenschutz und Datensicherheit, vol. 36, no. 6, pp. 433-438, 2012.
    • (2012) DuD-Datenschutz und Datensicherheit , vol.36 , Issue.6 , pp. 433-438
    • Rost, M.1
  • 45
    • 84945931746 scopus 로고    scopus 로고
    • Bundesamt für Sicherheit in der Informationstechnik (German Federal Office for Information Security) BSI Standards
    • Bundesamt für Sicherheit in der Informationstechnik (German Federal Office for Information Security), "BSI Standard 100-2: IT-Grundschutz Methodology Version 2.0," BSI Standards, 2008. [Online]. Available: https://www.bsi.bund.de/SharedDocs/Downloads/ EN/BSI/Publications/BSIStandards/standard 100-2 e pdf
    • (2008) BSI Standard 100-2: IT-Grundschutz Methodology Version 2. 0
  • 46
    • 84922583149 scopus 로고    scopus 로고
    • Generische Schutzmaßnahmen für Datenschutz-Schutzziele
    • T. Probst, "Generische Schutzmaßnahmen für Datenschutz-Schutzziele," DuD-Datenschutz und Datensicherheit, vol. 36, no. 6, pp. 439-444, 2012.
    • (2012) DuD-Datenschutz und Datensicherheit , vol.36 , Issue.6 , pp. 439-444
    • Probst, T.1
  • 47
    • 84945901798 scopus 로고    scopus 로고
    • DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE. (2012, January) The German AAL Standardization Roadmap (= Ambient Assisted Living)
    • DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE. (2012, January) The German AAL Standardization Roadmap (= Ambient Assisted Living). [Online]. Available: http://www.vde.com/en/dke/std/Documents/German% 20AAL%20Standardization%20Roadmap%20%5B1%5D.pdf
  • 50
    • 84945937085 scopus 로고    scopus 로고
    • Conference of the Data Protection Commissioners of the Federal Government and the Länder and Düsseldorf Circle. (2012, June) Guideline for data-protection compliant smart metering
    • Conference of the Data Protection Commissioners of the Federal Government and the Länder and Düsseldorf Circle. (2012, June) Guideline for data-protection compliant smart metering. [Online]. Available: http://www.bfdi.bund.de/SharedDocs/ Publikationen/EN/NationaleDSK/GuidelineSmartMeter.pdf
  • 51
    • 84945904958 scopus 로고    scopus 로고
    • Deutschland-online kfz-wesen-teilprojekt xkfz standardisierung-xkfz-spezifikation, version 1. 0. 0
    • XKfz-Working Group
    • XKfz-Working Group, "Deutschland-Online Kfz-Wesen-Teilprojekt XKfz Standardisierung-XKfz-Spezifikation, Version 1.0.0," Ministerium des Innern, für Sport und Infrastruktur Rheinland-Pfalz, Tech. Rep., 2012. [Online]. Available: http://www.it-planungsrat.de/SharedDocs/Downloads/DE/Projekte/ Abgeschlossene Projekte/Kfz-Wesen/A6 Standardisierung XKfz Spezifikation.pdf? blob=publicationFile
    • (2012) Ministerium des Innern, Für Sport und Infrastruktur Rheinland-Pfalz, Tech. Rep.
  • 52
    • 84945966255 scopus 로고    scopus 로고
    • IT-Planungsrat, ITPlanungsrat, Tech. Rep.
    • IT-Planungsrat, "Datenübertragung mit XTA (Version 2.0)," ITPlanungsrat, Tech. Rep., 2013. [Online]. Available: http://www.xoev. de/sixcms/media.php/13/Anlage2 XTA Spezifikation.6863.pdf
    • (2013) Datenübertragung Mit XTA (Version 2. 0)
  • 54
    • 84945912133 scopus 로고    scopus 로고
    • Ph. D. dissertation, Gjøvik University College
    • E. Paintsil, "Privacy and security risks analysis of identity management systems," Ph.D. dissertation, Gjøvik University College, 2013. [Online]. Available: http://brage.bibsys.no/xmlui/bitstream/id/101881/ Thesis Electronic Version EbenezerPaintsil.pdf.pdf
    • (2013) Privacy and Security Risks Analysis of Identity Management Systems
    • Paintsil, E.1
  • 56
    • 84945971690 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing, 01037/12/EN, Article 29 Data Protection Working Party Std. WP 196, Adopted July 1st
    • Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing, 01037/12/EN, Article 29 Data Protection Working Party Std. WP 196, Adopted July 1st 2012. [Online]. Available: http://ec.europa.eu/justice/data-protection/article-29/ documentation/opinion-recommendation/files/2012/wp196 en.pdf
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.