Privacy patterns for online interactions

@inproceedings{Romanosky2006PrivacyPF,
  title={Privacy patterns for online interactions},
  author={Sasha Romanosky and Alessandro Acquisti and Jason Hong and Lorrie Faith Cranor and Batya Friedman},
  booktitle={PLoP '06},
  year={2006}
}
A proper security architecture is an essential part of implementing robust and reliable networked applications. Security patterns have shown how reoccurring problems can be best solved with proven solutions. However, while they are critical for ensuring the confidentiality, integrity and availability of computing systems, security patterns do not specifically (or necessarily) address the privacy of individuals. Building on existing privacy pattern work, we identify three privacy patterns for… CONTINUE READING
Highly Cited
This paper has 43 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 26 extracted citations

References

Publications referenced by this paper.
Showing 1-6 of 6 references

editors) “Security Patterns: Integrating Security and System Engineering,

  • M. Markus, E. Fernandez, D. Hybertson, F. Buschmann, P Sommerlad
  • 2006
Highly Influential
8 Excerpts

Architectural Patterns for Enabling Application Security

  • J. Yoder, J. Baraclow
  • Proceedings of Pattern Languages of Programs…
  • 1997
Highly Influential
6 Excerpts

Similar Papers

Loading similar papers…