Literature Survey on Technologies for Developing Privacy-Aware Software

Software development requires the protection of privacy. However, a body of knowledge does not exist for the development of privacy-aware software. Based on a literature survey, this paper introduces various studies that address knowledge regarding the development of privacy-aware software, and describes the current status and future direction toward building a knowledge base for privacy-aware software development.

[1]  Jaap-Henk Hoepman,et al.  PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .

[2]  Ye Wang,et al.  Privacy requirements patterns for mobile operating systems , 2014, 2014 IEEE 4th International Workshop on Requirements Patterns (RePa).

[3]  Maritta Heisel,et al.  A Taxonomy of Requirements for the Privacy Goal Transparency , 2015, TrustBus.

[4]  Manfred Tscheligi,et al.  A Pattern Collection for Privacy Enhancing Technology , 2010 .

[5]  Antonio Kung PEARs: Privacy Enhancing ARchitectures , 2014, APF.

[6]  Lorrie Faith Cranor,et al.  Improving App Privacy: Nudging App Developers to Protect User Privacy , 2014, IEEE Security & Privacy.

[7]  W. Ryan,et al.  Privacy and freedom: Alan F. Westin Atheneum Publishers, $10 , 1967 .

[8]  José Luis Fernández Alemán,et al.  Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.

[9]  Muhammad Ilyas,et al.  A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing , 2012 .

[10]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[11]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[12]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[13]  Kuanchin Chen,et al.  Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..

[14]  Atsuo Hazeyama,et al.  A Metamodel for Security and Privacy Knowledge in Cloud Services , 2016, 2016 IEEE World Congress on Services (SERVICES).

[15]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[16]  M. Hafiz A collection of privacy design patterns , 2006, PLoP '06.

[17]  James A. Landay,et al.  Development and evaluation of emerging design patterns for ubiquitous computing , 2004, DIS '04.

[18]  David Wright,et al.  PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology , 2015, 2015 IEEE Security and Privacy Workshops.

[19]  Yod Samuel Martín García,et al.  Engineering privacy requirements valuable lessons from another realm , 2014 .

[20]  Dennis G. Kafura,et al.  Preprocess before You Build: Introducing a Framework for Privacy Requirements Engineering , 2013, 2013 International Conference on Social Computing.

[21]  Eduardo B. Fernández,et al.  Patterns to Support the Development of Privacy Policies , 2009, 2009 International Conference on Availability, Reliability and Security.

[22]  Gary McGraw,et al.  Knowledge for Software Security , 2005, IEEE Secur. Priv..

[23]  Jason Hong,et al.  Privacy patterns for online interactions , 2006, PLoP '06.

[24]  Kristian Beckers,et al.  Comparing Privacy Requirements Engineering Approaches , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.