Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{145026, author = {Priyanka K R and Shruthi B M}, title = {Confidentiality of Patterns}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {4}, number = {7}, pages = {49-57}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=145026}, abstract = {Inspired by the design patterns of object-oriented software architecture, we offer an initial set of “privacy patternsâ€. Our intent is to describe the most important ways in which software systems can offer privacy to their stakeholders. We express our privacy patterns as class diagrams in the UML (Universal Modeling Language), because this is a commonly used language for expressing the high-level architecture of an object-oriented system. In this initial set of privacy patterns, we sketch how each of Westin’s four states of privacy can be implemented in a software system. In addition to Westin’s states of Solitude, Intimacy, Anonymity, and Reserve, we develop a privacy pattern for an institutionalized form of Intimacy which we call Confidence. }, keywords = {Privacy modeling, privacy analysis, software system architecture, UML class diagram.}, month = {}, }
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry