ABSTRACT
In the age of Internet and loosely coupled applications, privacy has become a matter of concern. Individuals lose track of their personal data and have no control over databases and information systems containing their personal data. In the field of distributed systems, resarchers focus mainly on how to integrate a variety of systems in a way so that persons benefit from other systems' functionalities and data sources. In general, the integration is done on the business logic layer. As a consequence special properties of data, like privacy properties, are neglected. In fact, it is a big challenge for distributed applications to adapt privacy regulations, to ensure conformity to privacy regulations, and to execute the adaptation process in a transparent and comprehensible form. Unlike most existing work, this paper provides a solution to the problem of adapting privacy regulations in a distributed environment. The framework presented in this study is a novel enterprise architecture that assures privacy according to diverse data privacy regulations and illustrates the adapting process in a transparent and comprehensible form. Moreover, it maintains and enhances additional data privacy properties wherever they apply.
- J. Breuker and R. Hoekstra. Epistemology and ontology in core ontologies: FOLaw and LRI-Core, two core ontologies for law. In Proceedings of EKAW Workshop on Core ontologies. CEUR, 2004.Google Scholar
- Decentralized Information Group. Transparent accountable datamining initiative, 2006.Google Scholar
- W. Eberling. Resource access decision - ein framework zur realisierung eines datenbasierten zugriffsschutzes. Technical report, MATHEMA Software GmbH, 2003.Google Scholar
- European Parliament and Council. Official journal 1281, 23/11/1995 p. 0031--0050.Google Scholar
- S. Fischer-Hübner. IT-Security and Privacy - Design and Use of Privacy-Enhancing Security Mechanisms, volume 1958 of Lecture Notes in Computer Science. Springer, 2001.Google Scholar
- L. Korba and S. Kenny. Towards meeting the privacy challenge: Adapting drm. In Digital Rights Management Workshop, pages 118--136, 2002.Google Scholar
- J. Lehmann, J. Breuker, and B. Brouwer. Causatio<sup>nt</sup>: Modeling causation in ai&law. In Law and the Semantic Web, pages 77--96, 2003.Google Scholar
- META Group. Privacy enhancing technologies. Technical report, Danish Ministry of Science, Technology and Innovation, 2005.Google Scholar
- ODRL. ODRL - Open Digital Rights Language.Google Scholar
- PISA Consortium. Handbook of Privacy and Privacy-Enhancing Technologies, the case of intelligent software agents. College bescherming persoonsgegevens, The Hague, 2003.Google Scholar
- The Object Management Group (OMG). Resource access decision.Google Scholar
- W3C. Platform for privacy preferences (p3p) project.Google Scholar
- A. Westin. Privacy and freedom. In Atheneum, New York, 1967.Google Scholar
- M. Wettern and J. Von Knop. Datenschutz im hochschulbereich. In Jahrbuch der Heinrich-Heine-Universität Düsseldorf 2004, pages 575--589, 2005.Google Scholar
- XrML. Xrml - the digital rights language for trusted content and services.Google Scholar
Index Terms
A framework ensuring privacy in a distributed environment
Recommendations
Privacy policy enforcement in enterprises with identity management solutions
PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business ServicesPeople are usually asked by enterprises and other organizations to disclose their personal information to access web services and engage in business interactions. Enterprises need this information to enable their business processes. This is unlikely to ...
Designing privacy preserving data sharing middleware for internet of things
DATA '20: Proceedings of the Third Workshop on Data: Acquisition To AnalysisThe rise of low-cost Internet of Things (IoT) sensing and communication capabilities has given rise to a range of new smart services that rely on heterogeneous data from devices embedded in our everyday lives. The provision of such IoT services relies ...
A Lattice-Based Privacy Aware Access Control Model
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03As the amount of data being collected by service providers increases, privacy concerns increase for the data owners that must provide private data to get services. Legislative acts require enterprises protect the privacy of their customers and privacy ...
Comments