Skip to main content

Diagrammatically Formalising Constraints of a Privacy Ontology

  • Conference paper
  • First Online:
Diagrammatic Representation and Inference (Diagrams 2018)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10871))

Included in the following conference series:

  • 3171 Accesses

Abstract

Data privacy is a cross-cutting concern for many software projects. We reify a philosophically inspired model for data privacy into a concept diagram. From the concept diagram we extract the privacy constraints and demonstrate one mechanism for translating the constraints into executable software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.oecd.org/sti/ieconomy/oecd privacy framework.pdf.

  2. 2.

    http://www.un.org/en/universal-declaration-human-rights/.

  3. 3.

    http://xmlns.com/foaf/spec/.

References

  1. Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4(5), 193–220 (1890)

    Article  Google Scholar 

  2. Floridi, L.: The ontological interpretation of informational privacy. Ethics Inf. Technol. 7(4), 185–200 (2005)

    Article  Google Scholar 

  3. Chen, S., Williams, M.: Privacy: an ontological problem. In: Pacific Asia Conference on Information Systems, PACIS, pp. 1402–1413 (2010)

    Google Scholar 

  4. Stapleton, G., Compton, M., Howse, J.: Visualizing OWL 2 using diagrams. In: Visual Languages and Human-Centric Computing. IEEE (2017)

    Google Scholar 

  5. Moor, J.H.: Towards a theory of privacy in the information age. SIGCAS Comput. Soc. 27(3), 27–32 (1997)

    Google Scholar 

  6. Stapleton, G., Howse, J., Chapman, P., Delaney, A., Burton, J., Oliver, I.: Formalizing concept diagrams. In: Distributed Multimedia Systems, vol. 19, pp. 182–187. Knowledge Systems Institute (2013)

    Google Scholar 

  7. Howse, J., Stapleton, G., Taylor, J.: Spider diagrams. LMS J. Comput. Math. 8, 145–194 (2005)

    Article  MathSciNet  Google Scholar 

  8. Chen, S., Williams, M.: Grounding data purpose and data usage for better privacy requirements development: an information system perspective. In: Pacific Asia Conference on Information Systems, PACIS (2011)

    Google Scholar 

  9. Harris, T., Jones, S.P.: Transactional memory with data invariants. In: SIGPLAN Workshop on Languages, Compilers, and Hardware Support for Transactional Computing. ACM (2006)

    Google Scholar 

  10. Bradshaw, J., Uszok, A., Jeffers, R., Suri, N., Hayes, P., Burstein, M., Acquisti, A., Benyo, B., Breedy, M., Carvalho, M., Diller, D.: Representation and reasoning for DAML-based policy and domain services in KAoS and Nomads. In: Joint Conference on Autonomous Agents and Multiagent Systems, pp. 835–842. ACM (2003)

    Google Scholar 

  11. Motik, B., Patel-Schneider, P.F., Parsia, B.: OWL 2 web ontology language: structural specification and functional-style syntax. http://www.w3.org/TR/owl2-syntax/. Accessed Dec 2017

  12. Kagal, L., Finin, T., Paolucci, M., Srinivasan, N., Sycara, K., Denker, G.: Authorization and privacy for semantic web services. IEEE Intell. Syst. 19(4), 50–56 (2004)

    Article  Google Scholar 

  13. Cranor, L.F.: P3P: making privacy policies more useful. IEEE Secur. Privacy 99(6), 50–55 (2003)

    Article  Google Scholar 

  14. Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.M., Karat, J., Trombeta, A.: Privacy-aware role-based access control. Trans. Inf. Syst. Secur. 13(3), 24 (2010)

    Google Scholar 

  15. Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W., Thuraisingham, B.: ROWLBAC: representing role based access control in OWL. In: Access Control Models and Technologies, pp. 73–82. ACM (2008)

    Google Scholar 

  16. Oliver, I.: Privacy Engineering: A Dataflow and Ontological Approach. CreateSpace Independent Publishing Platform (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aidan Delaney .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, S., Delaney, A. (2018). Diagrammatically Formalising Constraints of a Privacy Ontology. In: Chapman, P., Stapleton, G., Moktefi, A., Perez-Kriz, S., Bellucci, F. (eds) Diagrammatic Representation and Inference. Diagrams 2018. Lecture Notes in Computer Science(), vol 10871. Springer, Cham. https://doi.org/10.1007/978-3-319-91376-6_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91376-6_59

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91375-9

  • Online ISBN: 978-3-319-91376-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics