Skip to main content

A Collection of Tools: The Privacy Tree

  • 357 Accesses

Abstract

This chapter highlights the fact that many different PETs have been proposed and used over the past four decades. It suggests that a classification may be a helpful way to compare and contrast these PETs, leading to a greater understanding of which ones are most appropriate for particular privacy goals. A literature review is provided and one selected classification is described in some detail.

Keywords

  • Privacy enhancing technologies
  • PETs
  • Privacy classification
  • Privacy taxonomy

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-81043-6_2
  • Chapter length: 18 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   44.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-81043-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   59.99
Price excludes VAT (USA)
Fig. 2.1
Fig. 2.2
Fig. 2.3

References

  • C. Adams, A classification for privacy techniques. Univ. Ottawa Law Technol. J. 3(1) (2006)

    Google Scholar 

  • A. Antón, J. Earp, A taxonomy for website privacy requirements, NCSU Technical Report TR-2001-14 (2001, Dec 18)

    Google Scholar 

  • A. Antón, J. Earp, A. Reese, Analyzing website privacy requirements using a privacy goal taxonomy, in Proceedings of the IEEE Joint International Conference on Requirements Engineering, (Essen, Germany, 2002, Sep 9–13)

    Google Scholar 

  • A. Barth, A. Datta, J. Mitchell, H. Nissenbaum, Privacy and contextual integrity: Framework and applications, in Proceedings of the IEEE Symposium on Security and Privacy, (2006, May), pp. 184–198

    Google Scholar 

  • CFIP: The Code of Fair Information Practices, U.S. Department of Health, Education and Welfare, Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers, and the Rights of Citizens, viii, 1973

    Google Scholar 

  • D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2) (1981, Feb)

    Google Scholar 

  • Enterprivacy Consulting Group, A taxonomy of privacy, in Infographic Based on Daniel Solove’s “A Taxonomy of Privacy” Paper. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=667622 (ca. 2006)

  • J. Heurix, P. Zimmermann, T. Neubauer, S. Fenz, A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1–17 (2015, Sept)

    CrossRef  Google Scholar 

  • H. Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford Law Books, 2009)

    CrossRef  Google Scholar 

  • OPC: Office of the Privacy Commissioner of Canada, Technology Analysis Division, Privacy enhancing technologies – A review of tools and techniques, Research Report (2017, Nov)

    Google Scholar 

  • A. Pfitzmann, M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, Anonymity Terminology document, version v0.34 (2010, Aug 10)

    Google Scholar 

  • PIPEDA: Personal Information Protection and Electronic Documents Act, S.C. 2000 c.5. See also Stephanie Perrin et al., The Personal Information Protection and Electronic Documents Act: An Annotated Guide, (Irwin Law, Toronto, 2001)

    Google Scholar 

  • A. Rezgui, A. Bouguettaya, M. Eltoweissy, Privacy on the web: Facts, challenges, and solutions, in IEEE Security and Privacy, (2003, Nov–Dec), pp. 40–49

    Google Scholar 

  • G. Skinner, S. Han, E. Chang, An information privacy taxonomy for collaborative environments. Inf. Manag. Comput. Secur. 14(4), 382–394 (2006, Aug 1)

    Google Scholar 

  • D. Solove, Understanding Privacy (Harvard University Press, 2008)

    Google Scholar 

  • P. Sprenger, Sun on privacy: get over it, Wired (1999, Jan 26)

    Google Scholar 

  • P.F. Syverson, S.G. Stubblebine, Group principals and the formalization of anonymity, in Proceedings of the First World Congress on Formal Methods in the Development of Computing Systems (FM ‘99), Volume 1, (Springer, LNCS 1708, Toulouse, France, 1999, Sep 20–24), pp. 814–833

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and Permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Verify currency and authenticity via CrossMark

Cite this chapter

Adams, C. (2021). A Collection of Tools: The Privacy Tree. In: Introduction to Privacy Enhancing Technologies. Springer, Cham. https://doi.org/10.1007/978-3-030-81043-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-81043-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-81042-9

  • Online ISBN: 978-3-030-81043-6

  • eBook Packages: Computer ScienceComputer Science (R0)