Confidentiality of Patterns

  • Unique Paper ID: 145026
  • Volume: 4
  • Issue: 7
  • PageNo: 49-57
  • Abstract:
  • Inspired by the design patterns of object-oriented software architecture, we offer an initial set of “privacy patterns”. Our intent is to describe the most important ways in which software systems can offer privacy to their stakeholders. We express our privacy patterns as class diagrams in the UML (Universal Modeling Language), because this is a commonly used language for expressing the high-level architecture of an object-oriented system. In this initial set of privacy patterns, we sketch how each of Westin’s four states of privacy can be implemented in a software system. In addition to Westin’s states of Solitude, Intimacy, Anonymity, and Reserve, we develop a privacy pattern for an institutionalized form of Intimacy which we call Confidence.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{145026,
        author = {Priyanka K R and Shruthi B M},
        title = {Confidentiality of Patterns},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {7},
        pages = {49-57},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=145026},
        abstract = {Inspired by the design patterns of object-oriented  software architecture, we offer an initial set of “privacy patterns”. Our intent is to describe the most important ways in which software systems can offer privacy to their stakeholders. We express our privacy patterns as class diagrams in the UML (Universal Modeling Language), because this is a commonly used language for expressing the high-level architecture of an object-oriented system. In this initial set of privacy patterns, we sketch how each of Westin’s four states of privacy can be implemented in a software system. In addition to Westin’s states of Solitude, Intimacy, Anonymity, and Reserve, we develop a privacy pattern for an institutionalized form of Intimacy which we call Confidence. },
        keywords = {Privacy modeling, privacy analysis, software system architecture, UML class diagram.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 4
  • Issue: 7
  • PageNo: 49-57

Confidentiality of Patterns

Related Articles