scholarly journals Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements

Author(s):  
Ioannis Agrafiotis ◽  
Sadie Creese ◽  
Michael Goldsmith ◽  
Nick Papanikolaou
1987 ◽  
Vol 134 (3) ◽  
pp. 133 ◽  
Author(s):  
W.J. Cullyer ◽  
C.H. Pygott
Keyword(s):  

2001 ◽  
Author(s):  
Ray Teitelbaum
Keyword(s):  

2021 ◽  
Vol 20 (2) ◽  
pp. 1-24
Author(s):  
Stef Verreydt ◽  
Koen Yskout ◽  
Wouter Joosen

Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.


1999 ◽  
Vol 23 (4) ◽  
pp. 491-499
Author(s):  
Charles Wetherell

Let me begin with a simple theme, repentance, and a simple message: repent from complacency in the practice and defense of social science history (SSH). I say this because I do not see social science historians meeting three major challenges that must be overcome if the larger, collective enterprise is to survive with the same vitality it had a decade ago. Those challenges are, first, to bring social theory forcefully back into historical research; second, to take formal methods to a new, higher level; and, third, to seek to train the next generation of social science historians in the theory and methods they will need in the next century.


Sign in / Sign up

Export Citation Format

Share Document