WordNet: a lexical database for English
Communications of the ACM
E-P3P privacy policies and privacy authorization
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
Privacy: What Developers and IT Professionals Should Know
Privacy: What Developers and IT Professionals Should Know
Sociotechnical Architecture for Online Privacy
IEEE Security and Privacy
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
A Pattern-Driven Security Process for SOA Applications
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
Architectural Risk Analysis of Software Systems Based on Security Patterns
IEEE Transactions on Dependable and Secure Computing
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
IEEE Transactions on Software Engineering
A Pattern-Based General Security Framework: An eBusiness Case Study
HPCC '09 Proceedings of the 2009 11th IEEE International Conference on High Performance Computing and Communications
Policy Evolution in Distributed Usage Control
Electronic Notes in Theoretical Computer Science (ENTCS)
Context management for m-commerce applications: determinants, methodology and the role of marketing
Information Technology and Management
A survey of existing approaches for pattern search and selection
Proceedings of the 15th European Conference on Pattern Languages of Programs
Hi-index | 0.00 |
User-related contextual factors affect the degree of privacy protection that is necessary for a given context. Such factors include: sensitivity of data, location of data, sector, contractual restrictions, cultural expectations, user trust (in organisations, etc.), trustworthiness of partners, security deployed in the infrastructure, etc. The relationship between these factors and privacy control measures that should be deployed can be complex. In this paper we propose a decision based support system that assesses context and deduces a list of recommendations and controls. One or more design patterns will be suggested, that can be used in conjunction to satisfy contextual requirements. This is a broad solution that can be used for privacy, security and other types of requirement.