Nothing Special   »   [go: up one dir, main page]

Skip to main content

Security Model for Informational Privacy

  • Conference paper
Intelligence and Security Informatics (WISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3917))

Included in the following conference series:

  • 671 Accesses

Abstract

Private/personal information is defined as any linguistic expression that has referent(s) of type natural person. Private information can be classified as: (1) atomic private information is an assertion that has a single human referent, and (2) compound private information is an assertion that has more than one human referent. If p is a piece of atomic private information of person v, then p is proprietary private information of v, and v is itsproprietor. A possessor refers to any agent that knows, stores, or owns the information [2].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Al-Fedaghi, S.: Crossing Privacy, Information, and Ethics. In: 17th International Conference Information Resources Management Association (IRMA 2006), Washington, DC, USA, May 21-24 (2006)

    Google Scholar 

  2. Al-Fedaghi, S.: How to Calculate the Information Privacy. In: Proceedings of the Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, October 12-14 (2005), http://www.lib.unb.ca/Texts/PST/2005/pdf/fedaghi.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Al-Fedaghi, S.S. (2006). Security Model for Informational Privacy. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_19

Download citation

  • DOI: https://doi.org/10.1007/11734628_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33361-6

  • Online ISBN: 978-3-540-33362-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics