Service interruption on Monday 11 July from 12:30 to 13:00: all the sites of the CCSD (HAL, EpiSciences, SciencesConf, AureHAL) will be inaccessible (network hardware connection).
Abstract : Privacy requirements are difficult to elicit for any given software engineering project that processes personal information. The problem is that these systems require personal data in order to achieve their functional requirements and privacy mechanisms that constrain the processing of personal information in such a way that the requirement still states a useful functionality.We present privacy patterns that support the expression and analysis of different privacy goals: anonymity, pseudonymity, unlinkability and unobservability. These patterns have a textual representation that can be instantiated. In addition, for each pattern, a logical predicate exists that can be used to validate the instantiation. We also present a structured method for instantiating and validating the privacy patterns, and for choosing privacy mechanisms. Our patterns can also be used to identify incomplete privacy requirements. The approach is illustrated by the case study of a patient monitoring system.
https://hal.inria.fr/hal-01542436 Contributor : Hal IfipConnect in order to contact the contributor Submitted on : Monday, June 19, 2017 - 5:01:16 PM Last modification on : Thursday, March 5, 2020 - 4:47:33 PM Long-term archiving on: : Sunday, December 17, 2017 - 2:13:20 PM
Kristian Beckers, Maritta Heisel. A Foundation for Requirements Analysis of Privacy Preserving Software. International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.93-107, ⟨10.1007/978-3-642-32498-7_8⟩. ⟨hal-01542436⟩