PEARs: Privacy Enhancing ARchitectures

  • Antonio Kung
Conference paper

DOI: 10.1007/978-3-319-06749-0_2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8450)
Cite this paper as:
Kung A. (2014) PEARs: Privacy Enhancing ARchitectures. In: Preneel B., Ikonomou D. (eds) Privacy Technologies and Policy. APF 2014. Lecture Notes in Computer Science, vol 8450. Springer, Cham


This paper points out the importance of architecture in designing a privacy-by-design system. It provides an overview on how architectures are designed, analysed and evaluated, through quality attributes, tactics and architecture patterns. It then specifies a straw man architecture design methodology for privacy. The resulting PEAR (Privacy Enhancing ARchitecture) methodology is then illustrated through an Intelligent Transport systems (ITS) example application. The integration of the resulting methodology in a Privacy-by-Design process is then explained. Suggestions for future work that will lead to an agreed engineering practice are finally provided.


Architecture Quality attributes Tactics Privacy Patterns PEAR PET Privacy-by-Design 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Antonio Kung
    • 1
  1. 1.TrialogParisFrance

Personalised recommendations