Abstract
Privacy is becoming an important issue and its importance will continue to grow over time. In the header of CNIL web site, it is mentioned that “information technology must respect the human identity, the human rights, privacy and liberties”. We believe that technology is far to be our enemy and can play a key role as a tool to protect human identity, the human rights, privacy and liberties if it is well implemented and used.
Do not spy on one another (49:12) Do not enter any houses except your own homes unless you are sure of their occupants’ consent (24:27).
(Holly Quran Verses)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
RuleML Initiative, The rule markup initiative. (2011), Available: http://ruleml.org/. Accessed 15 June 2011
Domain Decomposition Methods. Available: http://www.ddm.org/. Accessed 15 Nov 2011
W3C, Unified Service Description Language (USDL). (2010), Available: http://www.w3.org/005/Incubator/usdl/wiki/Main_Page. Accessed 13 Nov 2011
ITU Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis (2007)
D.S. Allison et al., in ICITST ‘09 Privacy and trust policies within SOA in International Conference for Internet Technology and Secured Transactions (2009)
D.S. Allison et al., in IWSESS ‘09 Metamodel for privacy policies within SOA, in The 2009 ICSE Workshop on Software Engineering for Secure Systems (2009)
D. Garcia et al., in ICDIM ‘10 An Electronic Contract Model for Privacy Protection in Service-Oriented Architecture in 5th International Conference on Digital Information Management, (Thunder Bay, Canada, 2010)
D.S. Herrmann, Complete Guide to Security and Privacy Metrics (Auerbach Publications, Florida, 2007)
Object Management Group Inc. (OMG), Value Delivery Modeling Language (VDML). (2011), Available: http://neffics.eu/wp-content/uploads/2011/06/11-05-11-VDM.pdf. Accessed 13 Nov 2010
T. Erl, SOA Design Patterns (Prentice Hall, New Jersey, 2009)
L. Schubert et al., The Future of Cloud Computing: Opportunities for European cloud computing beyond 2010 (2009), Available: http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf. Accessed 21 May 2010
M. Dixon, Identity management trends and predictions (2009), Available: http://blogs.oracle.com/identity/entry/identity_management_trends_and_predictions. Accessed 15 Nov 2011
R. Galloway and E. Thacker, The Exploit: A Theory of Networks (University of Minnesota Press, Minneapolis, 2008)
N. Shadbolt, T. Berners-Lee, Web science emerges. Sci. Am. Mag. 299, 76–81 (2008)
V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, New Jersey, 2009)
Palo Alto Research Center, CCNx open source project (2011), Available: http://www.ccnx.org/. Accessed 9 Nov 2010
OASIS, An Introduction to XRIs (Working Draft), ed, (2005)
T.P. Clancy, in Forward of the Book, in Information Storage and Management: Storing, Managing, and Protecting Digital Information, ed. by G. Somasundaram, A. Shrivastava (Wiley Publishing, New Jersey, 2009)
K. Cukier, The data deluge: businesses, governments and society are only starting to tap its vast potential. The Economist (23 Feb–5 Mar 2010). Available: http://www.economist.com/opinion/displaystory.cfm?story_id=15579717. Accessed 13 May 2010
K. Cukier, Data, data everywhere. The Economist (23 Feb–5 Mar 2010). Available: http://www.economist.com/specialreports/displaystory.cfm?story_id=15557443. Accessed 13 May 2010
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ben Ayed, G. (2014). Conclusion and Outlook. In: Architecting User-Centric Privacy-as-a-Set-of-Services. Springer Theses. Springer, Cham. https://doi.org/10.1007/978-3-319-08231-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-08231-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08230-1
Online ISBN: 978-3-319-08231-8
eBook Packages: EngineeringEngineering (R0)