A proper security architecture is an essential part of implementing
robust and reliable networked applications. Security patterns have
shown how reoccurring problems can be best solved with proven solutions.
However, while they are critical for ensuring the confidentiality,
integrity and availability of computing systems, security patterns
do not specifically (or necessarily) address the privacy of individuals.
Building on existing privacy pattern work, we identify three privacy
patterns for web-based activity: INFORMED CONSENT FOR WEB-BASED
TRANSACTIONS, MASKED ONLINE TRAFFIC, and MINIMAL INFORMATION
ASYMMETRY. The first pattern addresses a system architecture issue
and draws on Friedman's model for informed consent. The second and
third patterns provide support for end users and extend Jiang's 'Principle
of Minimum Asymmetry.' These patterns describe how users can protect
their privacy by both revealing less about themselves, and acquiring
more information from the party with whom they are communicating.
%0 Conference Paper
%1 RAHC06-Ppo
%A Romanosky, Sasha
%A Acquisti, Alessandro
%A Hong, Jason
%A Cranor, Lorrie Faith
%A Friedman, Batya
%B Proceedings of the 2006 conference on Pattern languages of programs
%C Portland, Oregon
%D 2006
%I ACM
%K asymmetric_information informed_consent masterarbeit privacy_patterns security signaling
%P 1--9
%R 10.1145/1415472.1415486
%T Privacy patterns for online interactions
%U http://portal.acm.org/citation.cfm?id=1415486
%X A proper security architecture is an essential part of implementing
robust and reliable networked applications. Security patterns have
shown how reoccurring problems can be best solved with proven solutions.
However, while they are critical for ensuring the confidentiality,
integrity and availability of computing systems, security patterns
do not specifically (or necessarily) address the privacy of individuals.
Building on existing privacy pattern work, we identify three privacy
patterns for web-based activity: INFORMED CONSENT FOR WEB-BASED
TRANSACTIONS, MASKED ONLINE TRAFFIC, and MINIMAL INFORMATION
ASYMMETRY. The first pattern addresses a system architecture issue
and draws on Friedman's model for informed consent. The second and
third patterns provide support for end users and extend Jiang's 'Principle
of Minimum Asymmetry.' These patterns describe how users can protect
their privacy by both revealing less about themselves, and acquiring
more information from the party with whom they are communicating.
%@ 978-1-60558-372-3
@inproceedings{RAHC06-Ppo,
abstract = {A proper security architecture is an essential part of implementing
robust and reliable networked applications. Security patterns have
shown how reoccurring problems can be best solved with proven solutions.
However, while they are critical for ensuring the confidentiality,
integrity and availability of computing systems, security patterns
do not specifically (or necessarily) address the privacy of individuals.
Building on existing privacy pattern work, we identify three privacy
patterns for web-based activity: {INFORMED} {CONSENT} {FOR} {WEB-BASED}
{TRANSACTIONS,} {MASKED} {ONLINE} {TRAFFIC,} and {MINIMAL} {INFORMATION}
{ASYMMETRY.} The first pattern addresses a system architecture issue
and draws on Friedman's model for informed consent. The second and
third patterns provide support for end users and extend Jiang's {'Principle}
of Minimum Asymmetry.' These patterns describe how users can protect
their privacy by both revealing less about themselves, and acquiring
more information from the party with whom they are communicating.},
added-at = {2010-06-13T21:13:32.000+0200},
address = {Portland, Oregon},
author = {Romanosky, Sasha and Acquisti, Alessandro and Hong, Jason and Cranor, Lorrie Faith and Friedman, Batya},
biburl = {https://www.bibsonomy.org/bibtex/2e06e31df713e22c43688772238adff66/pilpul},
booktitle = {Proceedings of the 2006 conference on Pattern languages of programs},
description = {Masterarbeit},
doi = {10.1145/1415472.1415486},
interhash = {ff29a337d01f995bf35c51e1c3ed19a0},
intrahash = {e06e31df713e22c43688772238adff66},
isbn = {978-1-60558-372-3},
keywords = {asymmetric_information informed_consent masterarbeit privacy_patterns security signaling},
pages = {1--9},
publisher = {{ACM}},
timestamp = {2010-06-13T21:13:33.000+0200},
title = {{Privacy patterns for online interactions}},
url = {http://portal.acm.org/citation.cfm?id=1415486},
year = 2006
}