Skip to main content

Part of the book series: Springer Theses ((Springer Theses))

  • 614 Accesses

Abstract

Privacy is becoming an important issue and its importance will continue to grow over time. In the header of CNIL web site, it is mentioned that “information technology must respect the human identity, the human rights, privacy and liberties”. We believe that technology is far to be our enemy and can play a key role as a tool to protect human identity, the human rights, privacy and liberties if it is well implemented and used.

Do not spy on one another (49:12) Do not enter any houses except your own homes unless you are sure of their occupants’ consent (24:27).

(Holly Quran Verses)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.cnil.fr/english/

References

  1. RuleML Initiative, The rule markup initiative. (2011), Available: http://ruleml.org/. Accessed 15 June 2011

  2. Domain Decomposition Methods. Available: http://www.ddm.org/. Accessed 15 Nov 2011

  3. W3C, Unified Service Description Language (USDL). (2010), Available: http://www.w3.org/005/Incubator/usdl/wiki/Main_Page. Accessed 13 Nov 2011

  4. ITU Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis (2007)

    Google Scholar 

  5. D.S. Allison et al., in ICITST ‘09 Privacy and trust policies within SOA in International Conference for Internet Technology and Secured Transactions (2009)

    Google Scholar 

  6. D.S. Allison et al., in IWSESS ‘09 Metamodel for privacy policies within SOA, in The 2009 ICSE Workshop on Software Engineering for Secure Systems (2009)

    Google Scholar 

  7. D. Garcia et al., in ICDIM ‘10 An Electronic Contract Model for Privacy Protection in Service-Oriented Architecture in 5th International Conference on Digital Information Management, (Thunder Bay, Canada, 2010)

    Google Scholar 

  8. D.S. Herrmann, Complete Guide to Security and Privacy Metrics (Auerbach Publications, Florida, 2007)

    Google Scholar 

  9. Object Management Group Inc. (OMG), Value Delivery Modeling Language (VDML). (2011), Available: http://neffics.eu/wp-content/uploads/2011/06/11-05-11-VDM.pdf. Accessed 13 Nov 2010

  10. T. Erl, SOA Design Patterns (Prentice Hall, New Jersey, 2009)

    Google Scholar 

  11. L. Schubert et al., The Future of Cloud Computing: Opportunities for European cloud computing beyond 2010 (2009), Available: http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf. Accessed 21 May 2010

  12. M. Dixon, Identity management trends and predictions (2009), Available: http://blogs.oracle.com/identity/entry/identity_management_trends_and_predictions. Accessed 15 Nov 2011

  13. R. Galloway and E. Thacker, The Exploit: A Theory of Networks (University of Minnesota Press, Minneapolis, 2008)

    Google Scholar 

  14. N. Shadbolt, T. Berners-Lee, Web science emerges. Sci. Am. Mag. 299, 76–81 (2008)

    Article  Google Scholar 

  15. V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, New Jersey, 2009)

    Google Scholar 

  16. Palo Alto Research Center, CCNx open source project (2011), Available: http://www.ccnx.org/. Accessed 9 Nov 2010

  17. OASIS, An Introduction to XRIs (Working Draft), ed, (2005)

    Google Scholar 

  18. T.P. Clancy, in Forward of the Book, in Information Storage and Management: Storing, Managing, and Protecting Digital Information, ed. by G. Somasundaram, A. Shrivastava (Wiley Publishing, New Jersey, 2009)

    Google Scholar 

  19. K. Cukier, The data deluge: businesses, governments and society are only starting to tap its vast potential. The Economist (23 Feb–5 Mar 2010). Available: http://www.economist.com/opinion/displaystory.cfm?story_id=15579717. Accessed 13 May 2010

  20. K. Cukier, Data, data everywhere. The Economist (23 Feb–5 Mar 2010). Available: http://www.economist.com/specialreports/displaystory.cfm?story_id=15557443. Accessed 13 May 2010

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ghazi Ben Ayed .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ben Ayed, G. (2014). Conclusion and Outlook. In: Architecting User-Centric Privacy-as-a-Set-of-Services. Springer Theses. Springer, Cham. https://doi.org/10.1007/978-3-319-08231-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08231-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08230-1

  • Online ISBN: 978-3-319-08231-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics