Applying Soft Computing Technologies for Implementing Privacy-Aware Systems
Designing privacy-aware systems gains much attention in recent years. One of the main issues for the protection of users’ privacy is the proper selection and realization of the respective Privacy Enhancing Technologies for the realization of the privacy requirements identified in the design phase. The selection of PETs must be conducted in a way that best fits the organization’s needs as well as other organization’s criteria like cost, complexity etc. In this paper the PriS method, which is used for incorporating security and privacy requirements early in the system development process, is extended by combining knowledge from a soft computing approach in order to improve the way that respective PETs are selected for the realization of the respective requirements incorporated during the design phase.
Unable to display preview. Download preview PDF.
- 1.Kalloniatis, C., Kavakli, E., Gritzalis, S.: Methods for Designing Privacy Aware Information Systems: A review. In: Alexandris, N., Chryssikopoulos, V., Douligeris, C., Kanellopoulos, N. (eds.) Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics (with International Participation). IEEE CPS Conference Publishing Services, Corfu (2009)Google Scholar
- 3.Loucopoulos, P.: From Information Modelling to Enterprise Modelling. In: Information Systems Engineering: State of the Art and Research Themes, pp. 67–78. Springer, Berlin (2000)Google Scholar
- 6.Kalloniatis, C., Kavakli, E., Kontellis, E.: PRIS tool: A case tool for privacy-oriented Requirements Engineering. Journal of Information Systems Security 6(1), 3–19 (2010); AIS SIGSECGoogle Scholar
- 7.University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, Samos (November 21, 2003)Google Scholar
- 8.Kavakli, E., Kalloniatis, C., Loucopoulos, P., Gritzalis, S.: Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework. Internet Research, Special issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice 16(2), 140–158 (2006)Google Scholar
- 9.Kalloniats, C., Kavakli, E., Gritzalis, S.: Dealing with Privacy Issues during the System Design Process. In: 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, December 18–21 (2005)Google Scholar
- 11.Kalloniatis, C., Kavakli, E., Gritzalis, S.: PriS Methodology: Incorporating Privacy Requirements into the System Design Process. In: Mylopoulos, J., Spafford, G. (eds.) Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference – Symposium on Requirements Engineering for Information Security. IEEE CPS, Paris (2005)Google Scholar
- 12.Klir, G., Yuan, B.: Fuzzy sets and fuzzy logic. Prentice-Hall (1995)Google Scholar
- 13.Zadeh, L.A.: Review of Books: A Mathematical Theory of Evidence. The AI Magazine 5(3), 81–83 (1984)Google Scholar
- 15.Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory, Sandia National Laboratories, Technical Report SAND 2002-0835, Albuquerque, New Mexico (2002)Google Scholar