Privacy Management in Global Organisations

Meeting privacy requirements can be challenging for global organisations, particularly where future Internet service provision models are involved. In this paper approaches will be explained that can be used to help address these issues, with a focus on some of the solutions that the author has been involved in developing in HP Labs that are currently being used, rolled out or are the subjects of further research.

[1]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[2]  William J. Kirsch,et al.  The protection of privacy and transborder flows of personal data: the work of the Council of Europe, the Organization for Economic Co-operation and Development and the European Economic Community , 1982, Legal Issues of Economic Integration.

[3]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[4]  J. Rubenfeld The Right of Privacy , 1989 .

[5]  Shafi Goldwasser,et al.  Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.

[6]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[7]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[8]  Andrew S. Patrick,et al.  From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.

[9]  Tomaz Klobucar,et al.  Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.

[10]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[11]  J. C. Cannon Privacy: What Developers and IT Professionals Should Know , 2004 .

[12]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[13]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[14]  Siani Pearson,et al.  Securing Information Transfer in Distributed Computing Environments , 2008, IEEE Security & Privacy.

[15]  James A. Hendler,et al.  Information accountability , 2008, CACM.

[16]  Gene novark,et al.  Exterminator: Automatically correcting memory errors with high probability , 2008, CACM.

[17]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[18]  Thomas S. Heydt-Benjamin,et al.  Accountable privacy supporting services , 2009 .

[19]  Andrew Charlesworth,et al.  Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.

[20]  Sadie Creese,et al.  Data Protection-Aware Design for Cloud Services , 2009, CloudCom.

[21]  Siani Pearson,et al.  Scalable, accountable privacy management for large organizations , 2009, 2009 13th Enterprise Distributed Object Computing Conference Workshops.

[22]  Rajneesh Sharma,et al.  Privacy Management for Global Organizations , 2009, DPM/SETOP.

[23]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[24]  Andrew Charlesworth,et al.  Analysis of Privacy Impact Assessments within Major jurisdictions , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[25]  Siani Pearson,et al.  Decision Support for Selection of Cloud Service Providers , 2010 .

[26]  Siani Pearson,et al.  Enhancing privacy in cloud computing via policy-based obfuscation , 2012, The Journal of Supercomputing.

[27]  S. Qureshi,et al.  E-Business Applications for Product Development and Competitive Growth: Emerging Technologies , 2010 .

[28]  Joaquin Garcia-Alfaro,et al.  Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers , 2010, DPM/SETOP.

[29]  Peter Schaar,et al.  Privacy by Design , 2010 .

[30]  Andrew Charlesworth,et al.  A Privacy Impact Assessment Tool for Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[31]  Siani Pearson Addressing Complexity in a Privacy Expert System , 2010, IPMU.

[32]  A. Cavoukian,et al.  Privacy by Design: essential for organizational accountability and strong business practices , 2010 .

[33]  Bu-Sung Lee,et al.  Towards Achieving Accountability, Auditability and Trust in Cloud Computing , 2011, ACC.

[34]  Valérie Issarny,et al.  Security and Trust , 2011, SFM.

[35]  Siani Pearson,et al.  Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.

[36]  S. Gritzalis,et al.  Privacy Enhancing Technologies: A Review , 2003, EGOV.

[37]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[38]  Siani Pearson,et al.  Privacy Compliance Checking using a Model-Based Approach , 2011 .

[39]  Kai Rannenberg,et al.  Privacy and Identity Management for Life , 2011, Privacy and Identity Management for Life.

[40]  Siani Pearson,et al.  A Decision Support System for Privacy Compliance , 2012 .

[41]  Siani Pearson,et al.  Privacy and Security for Cloud Computing , 2012, Computer Communications and Networks.

[42]  Jan Camenisch,et al.  Information privacy?! , 2012, Comput. Networks.

[43]  Raj Sharman,et al.  Threats, Countermeasures and Advances in Applied Information Security , 2012 .

[44]  A. Cavoukian Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .

[45]  Radu State,et al.  Data Privacy Management and Autonomous Spontaneous Security , 2013, Lecture Notes in Computer Science.

[46]  Marc Langheinrich,et al.  Privacy By Design , 2013, IEEE Pervasive Comput..

[47]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .