A requirements modeling language and its logic
Information Systems
Requirements engineering: a roadmap
Proceedings of the Conference on The Future of Software Engineering
ER '02 Proceedings of the 21st International Conference on Conceptual Modeling
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
Goal-Oriented Requirements Engineering: A Guided Tour
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
Security and Privacy Requirements Analysis within a Social Setting
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Configuring Common Personal Software: a Requirements-Driven Approach
RE '05 Proceedings of the 13th IEEE International Conference on Requirements Engineering
Modeling Security Requirements Through Ownership, Permission and Delegation
RE '05 Proceedings of the 13th IEEE International Conference on Requirements Engineering
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
What's wrong with online privacy policies?
Communications of the ACM - ACM's plan to go online first
PRiM: An i*-based process reengineering method for information systems specification
Information and Software Technology
An obligation model bridging access control policies and privacy policies
Proceedings of the 13th ACM symposium on Access control models and technologies
Can Patterns Improve i* Modeling? Two Exploratory Studies
REFSQ '08 Proceedings of the 14th international conference on Requirements Engineering: Foundation for Software Quality
Designing Privacy-Aware Personal Health Record Systems
ER '08 Proceedings of the ER 2008 Workshops (CMLSA, ECDM, FP-UML, M2AS, RIGiM, SeCoGIS, WISM) on Advances in Conceptual Modeling: Challenges and Opportunities
Designing for privacy in a multi-agent world
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Finding solutions in goal models: an interactive backward reasoning approach
ER'10 Proceedings of the 29th international conference on Conceptual modeling
Social Modeling for Requirements Engineering
Social Modeling for Requirements Engineering
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Hi-index | 0.00 |
User-centric privacy management is an important component of the Personal Web, and even more so in the context of personal health applications. We describe the motivations behind the development of a personal web privacy framework and outline a layered model for self-management of privacy in the context of Personal Health Record applications. In this paper we provide an overview of our framework. The privacy goals and settings mediator model addresses the understandability problem of privacy agreements and settings by supporting the users' privacy decision-making process. This model provides privacy experts with the tool support to encode their knowledge and fill the gap between the end-users' high-level privacy intentions and what personal health applications offer as privacy features. The second model in our framework, smart privacy model, is an ontological model that supports privacy enforcement. The model provides interoperable and computer interpretable translations of privacy settings, allowing the privacy settings selected by a user, to be translated as enforceable constraints on the data and processes of a personal workflow.