skip to main content
10.1145/1501434.1501490acmotherconferencesArticle/Chapter ViewAbstractPublication PagespstConference Proceedingsconference-collections
research-article

A framework ensuring privacy in a distributed environment

Published:30 October 2006Publication History

ABSTRACT

In the age of Internet and loosely coupled applications, privacy has become a matter of concern. Individuals lose track of their personal data and have no control over databases and information systems containing their personal data. In the field of distributed systems, resarchers focus mainly on how to integrate a variety of systems in a way so that persons benefit from other systems' functionalities and data sources. In general, the integration is done on the business logic layer. As a consequence special properties of data, like privacy properties, are neglected. In fact, it is a big challenge for distributed applications to adapt privacy regulations, to ensure conformity to privacy regulations, and to execute the adaptation process in a transparent and comprehensible form. Unlike most existing work, this paper provides a solution to the problem of adapting privacy regulations in a distributed environment. The framework presented in this study is a novel enterprise architecture that assures privacy according to diverse data privacy regulations and illustrates the adapting process in a transparent and comprehensible form. Moreover, it maintains and enhances additional data privacy properties wherever they apply.

References

  1. J. Breuker and R. Hoekstra. Epistemology and ontology in core ontologies: FOLaw and LRI-Core, two core ontologies for law. In Proceedings of EKAW Workshop on Core ontologies. CEUR, 2004.Google ScholarGoogle Scholar
  2. Decentralized Information Group. Transparent accountable datamining initiative, 2006.Google ScholarGoogle Scholar
  3. W. Eberling. Resource access decision - ein framework zur realisierung eines datenbasierten zugriffsschutzes. Technical report, MATHEMA Software GmbH, 2003.Google ScholarGoogle Scholar
  4. European Parliament and Council. Official journal 1281, 23/11/1995 p. 0031--0050.Google ScholarGoogle Scholar
  5. S. Fischer-Hübner. IT-Security and Privacy - Design and Use of Privacy-Enhancing Security Mechanisms, volume 1958 of Lecture Notes in Computer Science. Springer, 2001.Google ScholarGoogle Scholar
  6. L. Korba and S. Kenny. Towards meeting the privacy challenge: Adapting drm. In Digital Rights Management Workshop, pages 118--136, 2002.Google ScholarGoogle Scholar
  7. J. Lehmann, J. Breuker, and B. Brouwer. Causatio<sup>nt</sup>: Modeling causation in ai&law. In Law and the Semantic Web, pages 77--96, 2003.Google ScholarGoogle Scholar
  8. META Group. Privacy enhancing technologies. Technical report, Danish Ministry of Science, Technology and Innovation, 2005.Google ScholarGoogle Scholar
  9. ODRL. ODRL - Open Digital Rights Language.Google ScholarGoogle Scholar
  10. PISA Consortium. Handbook of Privacy and Privacy-Enhancing Technologies, the case of intelligent software agents. College bescherming persoonsgegevens, The Hague, 2003.Google ScholarGoogle Scholar
  11. The Object Management Group (OMG). Resource access decision.Google ScholarGoogle Scholar
  12. W3C. Platform for privacy preferences (p3p) project.Google ScholarGoogle Scholar
  13. A. Westin. Privacy and freedom. In Atheneum, New York, 1967.Google ScholarGoogle Scholar
  14. M. Wettern and J. Von Knop. Datenschutz im hochschulbereich. In Jahrbuch der Heinrich-Heine-Universität Düsseldorf 2004, pages 575--589, 2005.Google ScholarGoogle Scholar
  15. XrML. Xrml - the digital rights language for trusted content and services.Google ScholarGoogle Scholar

Index Terms

  1. A framework ensuring privacy in a distributed environment

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
            October 2006
            389 pages
            ISBN:1595936041
            DOI:10.1145/1501434

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 October 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader