PIP: A (Privacy) Injection Pattern for Inserting Privacy Patterns and Services in Software
dc.contributor.author | Ali, Naureen | |
dc.contributor.copyright-release | Not Applicable | en_US |
dc.contributor.degree | Master of Computer Science | en_US |
dc.contributor.department | Faculty of Computer Science | en_US |
dc.contributor.ethics-approval | Received | en_US |
dc.contributor.external-examiner | n/a | en_US |
dc.contributor.graduate-coordinator | Dr. Norbert Zeh | en_US |
dc.contributor.manuscripts | Not Applicable | en_US |
dc.contributor.thesis-reader | Dr. Srinivas Sampalli | en_US |
dc.contributor.thesis-reader | Dr. Denis Riordan | en_US |
dc.contributor.thesis-supervisor | Dr. Peter Bodorik | en_US |
dc.contributor.thesis-supervisor | Dr. Dawn Jutla | en_US |
dc.date.accessioned | 2015-11-26T15:30:13Z | |
dc.date.available | 2015-11-26T15:30:13Z | |
dc.date.defence | 2015-11-17 | |
dc.date.issued | 2015 | |
dc.description.abstract | Sensitive data may be leaked in many ways, and misuse of personal data from information systems is very common. It is challenging to implement privacy services in existing applications without affecting other modules. We propose the concept of a master privacy injection pattern (PIP) for software engineers to use to automate dynamically “injecting” existing privacy patterns in existing or new software without modifying its code, or in some cases modifying the code to a very small extent. We illustrate our new PIP and the simplicity of its implementation with the use cases that inject well-known de-identification patterns in a banking application and a hospital management system. Early evaluation results for PIP from a small survey of practising software engineering professionals are encouraging. The majority of respondents believe that the PIP is beneficial, easy to implement, and 85% of the participants stated their intention to use the pattern. | en_US |
dc.identifier.uri | http://hdl.handle.net/10222/64644 | |
dc.language.iso | en | en_US |
dc.subject | Privacy Pattern | en_US |
dc.subject | Privacy injection | en_US |
dc.subject | Privacy services | en_US |
dc.subject | Aspect Oriented programming | en_US |
dc.subject | Mocking | en_US |
dc.subject | Dependency Injection | en_US |
dc.title | PIP: A (Privacy) Injection Pattern for Inserting Privacy Patterns and Services in Software | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Ali-Naureen-MCSc-CSCI-November-2015.pdf
- Size:
- 2.99 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: