Abstract | ||
---|---|---|
The concepts of privacy and security are distinct, but they're often considered synonymously when applied to computational systems. This article explores the conceptual differences between computational privacy and security and suggests four mutually exclusive models that define four different fundamental approaches to privacy and security during design. It's crucial that developers make a conscious and explicit decision how the two concepts should be approached early during system design. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/MITP.2009.81 | IT Professional |
Keywords | Field | DocType |
Privacy,Protection,Computer security,Data security,Hardware,Power system security,Law,Finance,National security,Information security | Structured systems analysis and design method,Privacy by Design,Computer security,Information technology,Computer science,Cloud computing security,Personally identifiable information,Information privacy,Privacy software,Software development | Journal |
Volume | Issue | Citations |
11 | 4 | 0 |
PageRank | References | Authors |
0.34 | 1 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
George F. Hurlburt | 1 | 122 | 18.27 |
Keith W. Miller | 2 | 730 | 89.70 |
Jeffrey M. Voas | 3 | 1108 | 129.23 |
Jamison M. Day | 4 | 111 | 7.53 |