Dealing with Privacy for Protecting Information

被引:1
|
作者
Larrucea, Xabier [1 ]
Santamaria, Izaskun [1 ]
机构
[1] TECNALIA, Basque Res & Technol Alliance BRTA, Bizkaia, Spain
基金
欧盟地平线“2020”;
关键词
Differential privacy; ISO/IEC29110; Privacy; FRAMEWORK; IMPROVEMENT;
D O I
10.1007/978-3-030-85521-5_34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy is being a trending topic in cybersecurity context not only because it is related to current regulations such as GDPR, but also because it has an impact on every citizen within this digitalized world. In fact, there is a huge number of software systems managing or processing information related to individuals in somehow, and therefore software developments producing these systems must consider specific privacy measures. Privacy by design concept and shift left strategies are considering privacy as a special topic to be treated along the software development project. In this context, Very Small Companies are required to modify their development processes for including privacy. This paper provides a modification of the ISO/IEC 29110 basic profile, a set of activities for designing a privacy preserving approach, and the results of applying differential privacy mechanisms with an illustrative example.
引用
收藏
页码:518 / 530
页数:13
相关论文
共 50 条
  • [21] Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study
    Cassini, John A.
    Medlin, B. Dawn
    Romaniello, Adriana
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2008, 2 (02) : 70 - 82
  • [22] Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing
    Loehr, Hans
    Sadeghi, Ahmad-Reza
    Vishik, Claire
    Winandy, Marcel
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 396 - +
  • [23] Chain Ontology Based: A Model For Protecting Personal Information Privacy
    Omran, Esraa
    Bokma, Albert
    Abu Al-Maati, Shereef
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 371 - +
  • [24] PROTECTING PERSONAL PRIVACY IN USING GEOGRAPHIC INFORMATION-SYSTEMS
    ONSRUD, HJ
    JOHNSON, JP
    LOPEZ, XR
    [J]. PHOTOGRAMMETRIC ENGINEERING AND REMOTE SENSING, 1994, 60 (09): : 1083 - 1095
  • [25] PROTECTING PRIVACY OF COMPUTERIZED PATIENT INFORMATION MAY LIE IN THE CARDS
    SKOLNICK, AA
    [J]. JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1994, 272 (03): : 187 - 189
  • [26] PROTECTING PUBLICS PRIVACY IN COMPUTERIZED HEALTH AND WELFARE INFORMATION SYSTEMS
    NOBLE, JH
    [J]. SOCIAL WORK, 1971, 16 (01): : 35 - 41
  • [27] Protecting privacy
    Coyle, K
    [J]. LIBRARY JOURNAL, 2001, : 14 - 17
  • [28] PROTECTING PRIVACY
    ROTENBERG, M
    [J]. COMMUNICATIONS OF THE ACM, 1992, 35 (04) : 164 - 164
  • [29] Protecting online information privacy in a converged digital environment - the merits of the new Australian privacy principles
    Selvadurai, Niloufer
    [J]. INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2013, 22 (03) : 299 - 314
  • [30] HIPAA privacy regulations - New requirements for protecting patients' health information
    Sfikas, PM
    [J]. JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2002, 133 (12): : 1692 - 1695