Abstract
Data privacy is a cross-cutting concern for many software projects. We reify a philosophically inspired model for data privacy into a concept diagram. From the concept diagram we extract the privacy constraints and demonstrate one mechanism for translating the constraints into executable software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4(5), 193–220 (1890)
Floridi, L.: The ontological interpretation of informational privacy. Ethics Inf. Technol. 7(4), 185–200 (2005)
Chen, S., Williams, M.: Privacy: an ontological problem. In: Pacific Asia Conference on Information Systems, PACIS, pp. 1402–1413 (2010)
Stapleton, G., Compton, M., Howse, J.: Visualizing OWL 2 using diagrams. In: Visual Languages and Human-Centric Computing. IEEE (2017)
Moor, J.H.: Towards a theory of privacy in the information age. SIGCAS Comput. Soc. 27(3), 27–32 (1997)
Stapleton, G., Howse, J., Chapman, P., Delaney, A., Burton, J., Oliver, I.: Formalizing concept diagrams. In: Distributed Multimedia Systems, vol. 19, pp. 182–187. Knowledge Systems Institute (2013)
Howse, J., Stapleton, G., Taylor, J.: Spider diagrams. LMS J. Comput. Math. 8, 145–194 (2005)
Chen, S., Williams, M.: Grounding data purpose and data usage for better privacy requirements development: an information system perspective. In: Pacific Asia Conference on Information Systems, PACIS (2011)
Harris, T., Jones, S.P.: Transactional memory with data invariants. In: SIGPLAN Workshop on Languages, Compilers, and Hardware Support for Transactional Computing. ACM (2006)
Bradshaw, J., Uszok, A., Jeffers, R., Suri, N., Hayes, P., Burstein, M., Acquisti, A., Benyo, B., Breedy, M., Carvalho, M., Diller, D.: Representation and reasoning for DAML-based policy and domain services in KAoS and Nomads. In: Joint Conference on Autonomous Agents and Multiagent Systems, pp. 835–842. ACM (2003)
Motik, B., Patel-Schneider, P.F., Parsia, B.: OWL 2 web ontology language: structural specification and functional-style syntax. http://www.w3.org/TR/owl2-syntax/. Accessed Dec 2017
Kagal, L., Finin, T., Paolucci, M., Srinivasan, N., Sycara, K., Denker, G.: Authorization and privacy for semantic web services. IEEE Intell. Syst. 19(4), 50–56 (2004)
Cranor, L.F.: P3P: making privacy policies more useful. IEEE Secur. Privacy 99(6), 50–55 (2003)
Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.M., Karat, J., Trombeta, A.: Privacy-aware role-based access control. Trans. Inf. Syst. Secur. 13(3), 24 (2010)
Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W., Thuraisingham, B.: ROWLBAC: representing role based access control in OWL. In: Access Control Models and Technologies, pp. 73–82. ACM (2008)
Oliver, I.: Privacy Engineering: A Dataflow and Ontological Approach. CreateSpace Independent Publishing Platform (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Chen, S., Delaney, A. (2018). Diagrammatically Formalising Constraints of a Privacy Ontology. In: Chapman, P., Stapleton, G., Moktefi, A., Perez-Kriz, S., Bellucci, F. (eds) Diagrammatic Representation and Inference. Diagrams 2018. Lecture Notes in Computer Science(), vol 10871. Springer, Cham. https://doi.org/10.1007/978-3-319-91376-6_59
Download citation
DOI: https://doi.org/10.1007/978-3-319-91376-6_59
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91375-9
Online ISBN: 978-3-319-91376-6
eBook Packages: Computer ScienceComputer Science (R0)