Supporting Privacy by Design using Privacy Process Patterns

Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

Abstract

Advances in Information and Communication Technology (ICT) have had significant impact on every-day life and have allowed us to share, store and manipulate information easily and at any time. On the other hand, such situation also raises important privacy concerns. To deal with such concerns, the literature has identified the need to introduce a Privacy by Design (PbD) approach to support the elicitation and analysis of privacy requirements and their implementation through appropriate Privacy Enhancing Technologies. However, and despite all the work presented in the literature, there is still a gap between privacy design and implementation. This paper presents a set of Privacy Process Patterns that can be used to bridge that gap. To demonstrate the practical application of such patterns, we instantiate them in JavaScript Object Notation (JSON), we use them in conjunction with the Privacy Safeguard (PriS) methodology and we apply them to a real case study.
Original languageEnglish
Title of host publicationIFIP SEC 2017 32nd IFIP International Information Security Conference
Place of PublicationRome, Italy
PublisherSpringer LNCS
Pages491-505
Number of pages15
ISBN (Print)9783319584683
DOIs
Publication statusPublished - 4 May 2017
EventIFIP SEC 2017 32nd IFIP International Information Security Conference - Rome, Italy, 29-31 May, 2017
Duration: 4 May 2017 → …

Publication series

NameIFIP Advances in Information and Communication Technology

Conference

ConferenceIFIP SEC 2017 32nd IFIP International Information Security Conference
Period4/05/17 → …

Bibliographical note

The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-58469-0_33

Keywords

  • Privacy Process Patterns
  • Requirements Engineering
  • Information Security Modelling

Fingerprint

Dive into the research topics of 'Supporting Privacy by Design using Privacy Process Patterns'. Together they form a unique fingerprint.

Cite this