Abstract
In this chapter, we focus on the privacy and the security analyses of public administration (PA) systems regarding the privacy concerns and requirements. As it has been described in the architecture of VisiOn, the VisiOn Privacy Platform is composed of two frameworks and a common back-end that provides internal functionalities, data storage, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmadian, A.S., Strüber, D., Riediger, V., Jürjens, J.: Model-based privacy analysis in industrial ecosystems. In: Anjorin, A., Espinoza, H. (eds.) ECMFA 2017. LNCS, vol. 10376, pp. 215–231. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61482-3_13
Ahmadian, A.S., et al.: Model-based privacy and security analysis with CARiSMA. In: Proceedings of 2017 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 989–993, September 2017. https://doi.org/10.1145/3106237.3122823
Ahmadian, A.S., et al.: Supporting privacy impact assessment by model-based privacy analysis. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, Pau, France, April 09–13, 2018, pp. 1467–1474 (2018)
den Braber, F., et al.: Model-based security analysis in seven steps–a guided tour to the CORAS method. BT Technol. J. 25(1), 101–117 (2007). https://doi.org/10.1007/s10550-007-0013-9. ISSN: 1573–1995
Dalpiaz, F., Paja, E., Giorgini, P.: Security Requirements Engineering: Designing Secure Socio-technical Systems (2015). To appear
Georg, G., et al.: An aspect-oriented methodology for designing secure applications. INFSOF 51(5), 846–864 (2009)
Heitmeyer, C.L., et al.: Applying formal methods to a certifiably secure software system. IEEE Trans. Softw. Eng. 34(1), 82–98 (2008)
Hoepman, J.-H.: Privacy design strategies. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IFIP AICT, vol. 428, pp. 446–459. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_38
Islam, S., Mouratidis, H., Jürjens, J.: A framework to support alignment of secure software engineering with legal regulations. Softw. Syst. Model. 10(3), 369–394 (2011)
JDSoftware Inc. JDeSurvey repository on GitHub (2018). https://github.com/JD-Software/JDeSurvey. Accessed 18 May 2016
Jürjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13(3), 241–255 (2008). https://doi.org/10.1007/s00766-008-0067-3
Katt, B., Gander, M., Breu, R., Felderer, M.: Enhancing model driven security through pattern refinement techniques. In: Beckert, B., Damiani, F., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2011. LNCS, vol. 7542, pp. 169–183. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35887-6_9
Lano, K., Clark, D., Androutsopoulos, K.: Safety and security analysis of object-oriented models. In: Anderson, S., Felici, M., Bologna, S. (eds.) SAFECOMP 2002. LNCS, vol. 2434, pp. 82–93. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45732-1_10
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45800-X_33
Mouratidis, H., Giorgini, P.: Secure tropos: a security oriented extension of the tropos methodology. Int. J. Software Eng. Knowl. Eng. 17(02), 285–309 (2007)
Nguyen, P.H., et al.: SoSPa: a system of security design patterns for systematically engineering secure systems. In: MoDELS 2015, pp. 246–255 (2015)
OMG. BPMN 2.0. OMG (2011). http://www.omg.org/spec/BPMN/2.0
OMG. Unified Modeling Language (OMG UML). Technical report 2.5.1. Object Management Group (2017)
Pavlidis, M., Islam, S.: SecTro: a CASE tool for modelling security in requirements engineering using secure tropos. In: CAiSE Forum, pp. 89–96 (2011)
Pavlidis, M., Mouratidis, H., Islam, S.: Modelling security using trust based concepts. Int. J. Secure Softw. Eng. (IJSSE) 3(2), 36–53 (2012)
Pavlidis, M., et al.: Dealing with trust and control: a meta-model for trustworthy information systems development. In: 2012 Sixth International Conference on Research Challenges in Information Science (RCIS), pp. 1–9. IEEE (2012)
Pavlidis, M., et al.: Modeling trust relationships for developing trustworthy information systems. Int. J. Inf. Syst. Model. Des. (IJISMD) 5(1), 25–48 (2014)
Salnitri, M., Paja, E., Giorgini, P.: Maintaining secure business processes in light of socio-technical systems’ evolution. In: RE Conference Workshops, pp. 155–164. IEEE (2016)
Salnitri, M., et al.: STS-tool 3.0: maintaining security in socio-technical systems. In: Proceedings of CAiSE Forum 2015, pp. 205–212 (2015)
van Staden, W., Olivier, M.S.: Using purpose lattices to facilitate customisation of privacy agreements. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.) TrustBus 2007. LNCS, vol. 4657, pp. 201–209. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74409-2_22
The Free Software Foundation, GNU Affero General Public License Version 3 (2007). http://www.gnu.org/licenses/agpl-3.0.de.html
VisiOn Project. D3.5 - Privacy Run-Time Component. Technical report (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Peldszus, S., Ahmadian, A.S., Salnitri, M., Jürjens, J., Pavlidis, M., Mouratidis, H. (2020). Visual Privacy Management. In: Salnitri, M., Jürjens, J., Mouratidis, H., Mancini, L., Giorgini, P. (eds) Visual Privacy Management. Lecture Notes in Computer Science(), vol 12030. Springer, Cham. https://doi.org/10.1007/978-3-030-59944-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-59944-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59943-0
Online ISBN: 978-3-030-59944-7
eBook Packages: Computer ScienceComputer Science (R0)