Abstract
Designing privacy-aware systems gains much attention in recent years. One of the main issues for the protection of users’ privacy is the proper selection and realization of the respective Privacy Enhancing Technologies for the realization of the privacy requirements identified in the design phase. The selection of PETs must be conducted in a way that best fits the organization’s needs as well as other organization’s criteria like cost, complexity etc. In this paper the PriS method, which is used for incorporating security and privacy requirements early in the system development process, is extended by combining knowledge from a soft computing approach in order to improve the way that respective PETs are selected for the realization of the respective requirements incorporated during the design phase.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Methods for Designing Privacy Aware Information Systems: A review. In: Alexandris, N., Chryssikopoulos, V., Douligeris, C., Kanellopoulos, N. (eds.) Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics (with International Participation). IEEE CPS Conference Publishing Services, Corfu (2009)
Loucopoulos, P., Kavakli, V.: Enterprise Knowledge Management and Conceptual Modelling. In: Chen, P.P., Akoka, J., Kangassalu, H., Thalheim, B. (eds.) Conceptual Modeling. LNCS, vol. 1565, pp. 123–143. Springer, Heidelberg (1999)
Loucopoulos, P.: From Information Modelling to Enterprise Modelling. In: Information Systems Engineering: State of the Art and Research Themes, pp. 67–78. Springer, Berlin (2000)
Kavakli, E., Gritzalis, S., Kalloniatis, C.: Protecting Privacy in System Design: The Electronic Voting Case. Transforming Government People Process and Policy 1(4), 307–332 (2007)
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: The PriS method. Requirements Engineering 13(3), 241–255 (2008)
Kalloniatis, C., Kavakli, E., Kontellis, E.: PRIS tool: A case tool for privacy-oriented Requirements Engineering. Journal of Information Systems Security 6(1), 3–19 (2010); AIS SIGSEC
University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, Samos (November 21, 2003)
Kavakli, E., Kalloniatis, C., Loucopoulos, P., Gritzalis, S.: Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework. Internet Research, Special issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice 16(2), 140–158 (2006)
Kalloniats, C., Kavakli, E., Gritzalis, S.: Dealing with Privacy Issues during the System Design Process. In: 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, December 18–21 (2005)
Kavakli, V.: Goal Oriented Requirements Engineering: A Unifying Framework. Requirements Engineering Journal 6(4), 237–251 (2002)
Kalloniatis, C., Kavakli, E., Gritzalis, S.: PriS Methodology: Incorporating Privacy Requirements into the System Design Process. In: Mylopoulos, J., Spafford, G. (eds.) Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference – Symposium on Requirements Engineering for Information Security. IEEE CPS, Paris (2005)
Klir, G., Yuan, B.: Fuzzy sets and fuzzy logic. Prentice-Hall (1995)
Zadeh, L.A.: Review of Books: A Mathematical Theory of Evidence. The AI Magazine 5(3), 81–83 (1984)
Yager, R.: Quasi-Associative Operations in the Combination of Evidence. Kybernetes 16, 37–41 (1987)
Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory, Sandia National Laboratories, Technical Report SAND 2002-0835, Albuquerque, New Mexico (2002)
Inagaki, T.: Interdependence between Safety-Control Policy and Multiple-Sensor, Schemes Via Dempster-Shafer Theory. IEEE Transactions on Reliability 40(2), 182–188 (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kalloniatis, C., Belsis, P., Kavakli, E., Gritzalis, S. (2012). Applying Soft Computing Technologies for Implementing Privacy-Aware Systems. In: Bajec, M., Eder, J. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2012. Lecture Notes in Business Information Processing, vol 112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31069-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-31069-0_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31068-3
Online ISBN: 978-3-642-31069-0
eBook Packages: Computer ScienceComputer Science (R0)