Privacy Requirement Engineering Based on Modified Evidence Combination Approach 

Abstract

A major challenge in the field of software engineering is to make users trust the software that they use in their every day professional or recreational activities. Trusting software depends on various elements, one of which is the protection of user privacy. Protecting privacy can be defined as the right to determine when, how and to what information about them extends is communicated to others. The paper introduces the Privacy Safeguard (PriS) method. The method aims to include privacy requirements early in the system development process. Each privacy requirement is treated as a separate goal to be met during the system design process. The PriS method can be extended to address the degree of participation of every privacy requirements. It can be done by fuzzifiying privacy variables that maps degree of participation of each privacy variables to the [0, 1] interval. Dempster Shafer rule of combination is proposed to combine the evidences needed to select the implementation of the privacy requirement. A modified combination rule is proposed based on ambiguity measure (AM). The combination results based on the proposed approach can be more reasonable. 

Authors and Affiliations

Nithya V. P , R. Subha

Keywords

Related Articles

Inventory Management System Software for Public Universities in Ghana (IMSSPUG)

Managing inventories at Public Universities is one of the major challenges for higher educational institutions in Ghana. This is especially true for large, diverse and research-oriented institutions like the University f...

Development and Applications of Line Following Robot Based Health Care Management System

This paper report describes the techniques for analyzing, designing, controlling and improving the health care management system. A line following robot carrying medicine has been designed for providing the medicine to t...

Design of WLAN RF front end LNA for Noise & Gain Improvement  

The design of a Low Noise Amplifier (LNA) in Radio Frequency (RF) circuit requires the trade-off many importance characteristics such as gain, Noise Figure (NF), stability, power consumption and complexity).In this...

A Review on Otsu Image Segmentation Algorithm 

Image segmentation is the fundamental approach of digital image processing. Among all the segmentation methods, Otsu method is one of the most successful methods for image thresholding because of its simple calculat...

Evaluating the Performance and Delay in Unstructured Peer to Peer Networks  

Peer-to-Peer computing has become a popular networking paradigm for file sharing, distributed computing, collaborative working, etc. The widely used unstructured Peer to Peer protocols mainly face problems affectin...

Download PDF file
  • EP ID EP93590
  • DOI -
  • Views 162
  • Downloads 0

How To Cite

Nithya V. P, R. Subha (2013). Privacy Requirement Engineering Based on Modified Evidence Combination Approach . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 600-605. https://europub.co.uk./articles/-A-93590