Process modeling as a basis for auditing information privacy
dc.contributor.author | Herkenhöner, Ralph | |
dc.contributor.author | Meer, Hermann de | |
dc.contributor.editor | Abramowicz, Witold | |
dc.contributor.editor | Maciaszek, Leszek | |
dc.contributor.editor | Kowalczyk, Ryszard | |
dc.contributor.editor | Speck, Andreas | |
dc.date.accessioned | 2019-06-03T12:25:21Z | |
dc.date.available | 2019-06-03T12:25:21Z | |
dc.date.issued | 2009 | |
dc.description.abstract | Information privacy has become an important task for every data processing organization. To meet its demands, organizations apply privacy-enhancing technologies and identity management to their business processes. But the increasing number of privacy breaches shows that this task is complex and not well understood. In this position paper, a formal method for modeling an proving information privacy within a process model is envisioned. Such a model would allow an integration at process design, increase the understanding and effectiveness of the privacy protection mechanisms, and enable compliance checks and data protection auditing. | en |
dc.identifier.isbn | 978-3-88579-241-3 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/23235 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Business process, services – computing and intelligent service management | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-147 | |
dc.title | Process modeling as a basis for auditing information privacy | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 232 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 231 | |
gi.conference.date | March 23–25, 2009 | |
gi.conference.location | Leipzig | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1