Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-642-54069-1_1guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Problem-Based Approach for Computer-Aided Privacy Threat Identification

Published: 10 October 2012 Publication History

Abstract

Recently, there has been an increase of reported privacy threats hitting large software systems. These threats can originate from stakeholders that are part of the system. Thus, it is crucial for software engineers to identify these privacy threats, refine these into privacy requirements, and design solutions that mitigate the threats.
In this paper, we introduce our methodology named Problem-Based Privacy Analysis ProPAn. The ProPAn method is an approach for identifying privacy threats during the requirements analysis of software systems using problem frame models. Our approach does not rely entirely on the privacy analyst to detect privacy threats, but allows a computer aided privacy threat identification that is derived from the relations between stakeholders, technology, and personal information in the system-to-be.
To capture the environment of the system, e.g., stakeholders and other IT systems, we use problem frames, a requirements engineering approach founded on the modeling of a machine system-to-be in its environment e.g. stakeholders, other software. We define a UML profile for privacy requirements and a reasoning technique that identifies stakeholders, whose personal information are stored or transmitted in the system-to-be and stakeholders from whom we have to protect this personal information. We illustrate our approach using an eHealth scenario provided by the industrial partners of the EU project NESSoS.

References

[1]
Alebrahim, A., Hatebur, D., Heisel, M.: A method to derive software architectures from quality requirements. In: Thu, T.D., Leung, K. eds. Proceedings of the 18th Asia-Pacific Software Engineering Conference APSEC, pp. 322---330. IEEE Computer Society 2011
[2]
Asnar, Y., Li, T., Massacci, F., Paci, F.: Computer aided threat identification. In: Proceedings of the 2011 IEEE 13th Conference on Commerce and Enterprise Computing, CEC 2011, pp. 145---152. IEEE Computer Society 2011
[3]
Atos Origin: Papyrus UML Modelling Tool February 2011, http://www.papyrusuml.org/
[4]
AT&T and Bell-Labs: Graphviz - Graph Visualization Software June 2012, http://www.graphviz.org
[5]
Côté, I., Hatebur, D., Heisel, M., Schmidt, H.: UML4PF --- a tool for problem-oriented requirements analysis. In: Proceedings of the International Conference on Requirements Engineering RE, pp. 349---350. IEEE Computer Society 2011
[6]
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16, 3---32 2011
[7]
Eclipse Foundation: Eclipse - An Open Development Platform 2011, http://www.eclipse.org/
[8]
Eclipse Foundation: Acceleo - transforming models into code June 2012, http://www.eclipse.org/acceleo/
[9]
EU: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Tech. rep., European CommunityEU 1995, http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
[10]
Hafiz, M.: A collection of privacy design patterns. In: Proceedings of the 2006 Conference on Pattern Languages of Programs, PLoP 2006, pp. 7:1---7:13. ACM 2006
[11]
Hansen, M., Schwartz, A., Cooper, A.: Privacy and Identity Management. IEEE Security & Privacy 62, 38---45 2008
[12]
Hatebur, D., Heisel, M.: A foundation for requirements analysis of dependable software. In: Buth, B., Rabe, G., Seyfarth, T. eds. SAFECOMP 2009. LNCS, vol. 5775, pp. 311---325. Springer, Heidelberg 2009
[13]
Hatebur, D., Heisel, M.: A UML profile for requirements analysis of dependable software. In: Schoitsch, E. ed. SAFECOMP 2010. LNCS, vol. 6351, pp. 317---331. Springer, Heidelberg 2010
[14]
ISO and IEC: Common Criteria for Information Technology Security Evaluation --- Part 2 Security functional components. ISO/IEC 15408, International Organization for Standardization ISO and International Electrotechnical Commission IEC 2009
[15]
Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley 2001
[16]
Jackson, M., Zave, P.: Deriving specifications from requirements: an example. In: Proceedings 17th Int. Conf. on Software Engineering, Seattle, USA, pp. 15---24. ACM Press 1995
[17]
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13, 241---255 2008
[18]
OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Tech. rep. Organisation for Economic Co-operation and Development OECD 1980, http://www.oecd.org/document/18/0,3746,en_2649_34255_1815186_1_1_1_1,00&&en-USS_01DBC.html
[19]
Westin, A.F.: Privacy and Freedom. Atheneum, New York 1967

Cited By

View all
  • (2021)Integrating Security and Privacy in HCD-ScrumProceedings of the 14th Biannual Conference of the Italian SIGCHI Chapter10.1145/3464385.3464746(1-5)Online publication date: 11-Jul-2021
  • (2020)PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection RequirementsData Privacy Management, Cryptocurrencies and Blockchain Technology10.1007/978-3-030-66172-4_10(161-177)Online publication date: 17-Sep-2020
  • (2018)Effective and efficient privacy threat modeling through domain refinementsProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167414(1175-1178)Online publication date: 9-Apr-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
APF 2012: Revised Selected Papers of the First Annual Privacy Forum on Privacy Technologies and Policy - Volume 8319
October 2012
214 pages
ISBN:9783642540684
  • Editors:
  • Bart Preneel,
  • Demosthenes Ikonomou

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 10 October 2012

Author Tags

  1. privacy
  2. problem frames
  3. requirements engineering
  4. threat analysis

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Integrating Security and Privacy in HCD-ScrumProceedings of the 14th Biannual Conference of the Italian SIGCHI Chapter10.1145/3464385.3464746(1-5)Online publication date: 11-Jul-2021
  • (2020)PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection RequirementsData Privacy Management, Cryptocurrencies and Blockchain Technology10.1007/978-3-030-66172-4_10(161-177)Online publication date: 17-Sep-2020
  • (2018)Effective and efficient privacy threat modeling through domain refinementsProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167414(1175-1178)Online publication date: 9-Apr-2018

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media