Yiyun Shen, Markus Miettinen, Pirjo Moen, L. Kutvonen
{"title":"服务生态系统中的隐私保护方法","authors":"Yiyun Shen, Markus Miettinen, Pirjo Moen, L. Kutvonen","doi":"10.1109/EDOCW.2011.59","DOIUrl":null,"url":null,"abstract":"Emergence of business networking and social networking increases the exchange of sensitive information and creation of behaviour traces in the network. However, the current computing and communication solutions do not provide sufficient conceptual, architectural or technical facilities to preserve privacy while collaborating in the network. This paper enhances definition on privacy-related concepts to become sufficient for open service ecosystems, and finally introduces a privacy-preservation architecture with emphasis on usability, sustainability against threats, and reasonable cost of establishment and utilisation. As this architecture introduces new categories of tools for privacy preservation, it is significant also as a roadmap or maturity model.","PeriodicalId":351015,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Privacy Preservation Approach in Service Ecosystems\",\"authors\":\"Yiyun Shen, Markus Miettinen, Pirjo Moen, L. Kutvonen\",\"doi\":\"10.1109/EDOCW.2011.59\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Emergence of business networking and social networking increases the exchange of sensitive information and creation of behaviour traces in the network. However, the current computing and communication solutions do not provide sufficient conceptual, architectural or technical facilities to preserve privacy while collaborating in the network. This paper enhances definition on privacy-related concepts to become sufficient for open service ecosystems, and finally introduces a privacy-preservation architecture with emphasis on usability, sustainability against threats, and reasonable cost of establishment and utilisation. As this architecture introduces new categories of tools for privacy preservation, it is significant also as a roadmap or maturity model.\",\"PeriodicalId\":351015,\"journal\":{\"name\":\"2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EDOCW.2011.59\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDOCW.2011.59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy Preservation Approach in Service Ecosystems
Emergence of business networking and social networking increases the exchange of sensitive information and creation of behaviour traces in the network. However, the current computing and communication solutions do not provide sufficient conceptual, architectural or technical facilities to preserve privacy while collaborating in the network. This paper enhances definition on privacy-related concepts to become sufficient for open service ecosystems, and finally introduces a privacy-preservation architecture with emphasis on usability, sustainability against threats, and reasonable cost of establishment and utilisation. As this architecture introduces new categories of tools for privacy preservation, it is significant also as a roadmap or maturity model.