Skip to main content

Visual Privacy Management

  • Chapter
  • First Online:
Visual Privacy Management

Abstract

In this chapter, we focus on the privacy and the security analyses of public administration (PA) systems regarding the privacy concerns and requirements. As it has been described in the architecture of VisiOn, the VisiOn Privacy Platform is composed of two frameworks and a common back-end that provides internal functionalities, data storage, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://carisma.umlsec.de.

  2. 2.

    http://eclipse.org/.

  3. 3.

    http://getbootstrap.com/.

References

  1. Ahmadian, A.S., Strüber, D., Riediger, V., Jürjens, J.: Model-based privacy analysis in industrial ecosystems. In: Anjorin, A., Espinoza, H. (eds.) ECMFA 2017. LNCS, vol. 10376, pp. 215–231. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61482-3_13

    Chapter  Google Scholar 

  2. Ahmadian, A.S., et al.: Model-based privacy and security analysis with CARiSMA. In: Proceedings of 2017 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 989–993, September 2017. https://doi.org/10.1145/3106237.3122823

  3. Ahmadian, A.S., et al.: Supporting privacy impact assessment by model-based privacy analysis. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, Pau, France, April 09–13, 2018, pp. 1467–1474 (2018)

    Google Scholar 

  4. den Braber, F., et al.: Model-based security analysis in seven steps–a guided tour to the CORAS method. BT Technol. J. 25(1), 101–117 (2007). https://doi.org/10.1007/s10550-007-0013-9. ISSN: 1573–1995

  5. Dalpiaz, F., Paja, E., Giorgini, P.: Security Requirements Engineering: Designing Secure Socio-technical Systems (2015). To appear

    Google Scholar 

  6. Georg, G., et al.: An aspect-oriented methodology for designing secure applications. INFSOF 51(5), 846–864 (2009)

    Google Scholar 

  7. Heitmeyer, C.L., et al.: Applying formal methods to a certifiably secure software system. IEEE Trans. Softw. Eng. 34(1), 82–98 (2008)

    Article  Google Scholar 

  8. Hoepman, J.-H.: Privacy design strategies. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IFIP AICT, vol. 428, pp. 446–459. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_38

    Chapter  Google Scholar 

  9. Islam, S., Mouratidis, H., Jürjens, J.: A framework to support alignment of secure software engineering with legal regulations. Softw. Syst. Model. 10(3), 369–394 (2011)

    Article  Google Scholar 

  10. JDSoftware Inc. JDeSurvey repository on GitHub (2018). https://github.com/JD-Software/JDeSurvey. Accessed 18 May 2016

  11. Jürjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  12. Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13(3), 241–255 (2008). https://doi.org/10.1007/s00766-008-0067-3

  13. Katt, B., Gander, M., Breu, R., Felderer, M.: Enhancing model driven security through pattern refinement techniques. In: Beckert, B., Damiani, F., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2011. LNCS, vol. 7542, pp. 169–183. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35887-6_9

    Chapter  Google Scholar 

  14. Lano, K., Clark, D., Androutsopoulos, K.: Safety and security analysis of object-oriented models. In: Anderson, S., Felici, M., Bologna, S. (eds.) SAFECOMP 2002. LNCS, vol. 2434, pp. 82–93. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45732-1_10

    Chapter  Google Scholar 

  15. Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45800-X_33

    Chapter  MATH  Google Scholar 

  16. Mouratidis, H., Giorgini, P.: Secure tropos: a security oriented extension of the tropos methodology. Int. J. Software Eng. Knowl. Eng. 17(02), 285–309 (2007)

    Article  Google Scholar 

  17. Nguyen, P.H., et al.: SoSPa: a system of security design patterns for systematically engineering secure systems. In: MoDELS 2015, pp. 246–255 (2015)

    Google Scholar 

  18. OMG. BPMN 2.0. OMG (2011). http://www.omg.org/spec/BPMN/2.0

  19. OMG. Unified Modeling Language (OMG UML). Technical report 2.5.1. Object Management Group (2017)

    Google Scholar 

  20. Pavlidis, M., Islam, S.: SecTro: a CASE tool for modelling security in requirements engineering using secure tropos. In: CAiSE Forum, pp. 89–96 (2011)

    Google Scholar 

  21. Pavlidis, M., Mouratidis, H., Islam, S.: Modelling security using trust based concepts. Int. J. Secure Softw. Eng. (IJSSE) 3(2), 36–53 (2012)

    Article  Google Scholar 

  22. Pavlidis, M., et al.: Dealing with trust and control: a meta-model for trustworthy information systems development. In: 2012 Sixth International Conference on Research Challenges in Information Science (RCIS), pp. 1–9. IEEE (2012)

    Google Scholar 

  23. Pavlidis, M., et al.: Modeling trust relationships for developing trustworthy information systems. Int. J. Inf. Syst. Model. Des. (IJISMD) 5(1), 25–48 (2014)

    Article  Google Scholar 

  24. Salnitri, M., Paja, E., Giorgini, P.: Maintaining secure business processes in light of socio-technical systems’ evolution. In: RE Conference Workshops, pp. 155–164. IEEE (2016)

    Google Scholar 

  25. Salnitri, M., et al.: STS-tool 3.0: maintaining security in socio-technical systems. In: Proceedings of CAiSE Forum 2015, pp. 205–212 (2015)

    Google Scholar 

  26. van Staden, W., Olivier, M.S.: Using purpose lattices to facilitate customisation of privacy agreements. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.) TrustBus 2007. LNCS, vol. 4657, pp. 201–209. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74409-2_22

    Chapter  Google Scholar 

  27. The Free Software Foundation, GNU Affero General Public License Version 3 (2007). http://www.gnu.org/licenses/agpl-3.0.de.html

  28. VisiOn Project. D3.5 - Privacy Run-Time Component. Technical report (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sven Peldszus .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Peldszus, S., Ahmadian, A.S., Salnitri, M., Jürjens, J., Pavlidis, M., Mouratidis, H. (2020). Visual Privacy Management. In: Salnitri, M., Jürjens, J., Mouratidis, H., Mancini, L., Giorgini, P. (eds) Visual Privacy Management. Lecture Notes in Computer Science(), vol 12030. Springer, Cham. https://doi.org/10.1007/978-3-030-59944-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59944-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59943-0

  • Online ISBN: 978-3-030-59944-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics