A Refinement Approach for the Reuse of Privacy Risk Analysis Results

被引:7
|
作者
Joyee De, Sourya [1 ]
Le Metayer, Daniel [1 ]
机构
[1] Univ Lyon, INRIA, Lyon, France
来源
关键词
SOFTWARE REUSE; DESIGN;
D O I
10.1007/978-3-319-67280-9_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The objective of this paper is to improve the cost effectiveness of privacy impact assessments through (1) a more systematic approach, (2) a better integration with privacy by design and (3) enhanced reusability. We present a three-tier process including a generic privacy risk analysis depending on the specifications of the system and two refinements based on the architecture and the deployment context respectively. We illustrate our approach with the design of a biometric access control system.
引用
收藏
页码:52 / 83
页数:32
相关论文
共 50 条
  • [31] Analogy-based domain analysis approach to software reuse
    Chung-Horng Lung
    Joseph E. Urban
    Gerald T. Mackulak
    Requirements Engineering, 2007, 12 : 1 - 22
  • [32] Analogy-based domain analysis approach to software reuse
    Lung, Chung-Horng
    Urban, Joseph E.
    Mackulak, Gerald T.
    REQUIREMENTS ENGINEERING, 2007, 12 (01) : 1 - 22
  • [33] An integrated approach to domain analysis and reuse for engineering complex systems
    Lam, W
    Whittle, B
    McDermid, J
    Wilson, S
    IEEE SYMPOSIUM AND WORKSHOP ON ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 1996, : 102 - 109
  • [34] PRASH: A Framework for Privacy Risk Analysis of Smart Homes
    Bugeja, Joseph
    Jacobsson, Andreas
    Davidsson, Paul
    SENSORS, 2021, 21 (19)
  • [35] On the Perfect Privacy: A Statistical Analysis of Network Traffic Approach
    RezaeiTabar, Amir Hossein
    Diyanat, Abolfazl
    Khonsari, Ahmad
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (07) : 1357 - 1360
  • [36] Privacy Vulnerability Analysis for Android Applications A Practical Approach
    Argudo, Alejandro
    Lopez, Gabriel
    Sanchez, Franklin
    2017 FOURTH INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2017, : 256 - 260
  • [37] Refinement and Reuse of TLM 2.0 Models: the key for ESL success
    Reyes, Victor
    2009 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), PROCEEDINGS OF TECHNICAL PROGRAM, 2009, : 102 - 105
  • [38] Dynamic reuse of subroutine results
    Shamir, L.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2006, 52 (10) : 603 - 608
  • [39] Privacy at risk
    Chappel, T
    SEARCH, 1997, 28 (06): : 171 - 171
  • [40] DPKnob: A visual analysis approach to risk-aware formulation of differential privacy schemes for data query scenarios
    Jiao, Shuangcheng
    Cheng, Jiang
    Huang, Zhaosong
    Li, Tong
    Xie, Tiankai
    Chen, Wei
    Ma, Yuxin
    Wang, Xumeng
    VISUAL INFORMATICS, 2024, 8 (03): : 42 - 52