Stuart S. Shapiro

Learn More
"Privacy by design" (PbD) represents a distinct philosophical movement and a shift away from the dominant legal-oriented approach to privacy and toward an approach that is more proactive, technical, and embedded. However, it suffers from the general absence of organized systematic techniques for carrying it out. In part, this gap reflects a failure to(More)
Cyber security and threat information sharing efforts involve a variety of groups of practicioners and stakeholders. This paper presents a methodology for analyzing information sharing efforts, to determine whether and how well the efforts will succeed. An effort to share information between two groups is represented by a directed graph. Each edge is(More)
Anonymization — the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual — has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than(More)
To date, top-down efforts to evolve and structure privacy engineering knowledge have tended to reflect common systems engineering/development life cycle activities. A different approach suggests a particular need for technical analytical methods. To help address this need, this paper proposes to adapt for privacy engineering an existing technique,(More)
  • 1