You are here: Home Contents V6 N1 V6N1_Kalloniatis.html
Personal tools

PriS-Tool: A Case Tool for Privacy-Oriented Requirements Engineering



Full text

Journal of Information System Security
Volume 6, Number 1 (2010)
Pages 319
ISSN 1551-0123
Christos Kalloniatis — University of the Aegean, Greece
Evangelia Kavakli — University of the Aegean, Greece
Efstathios Kontelis — University of the Aegean, Greece
Information Institute Publishing, Washington DC, USA




PriS is a security and privacy requirements engineering method which aims on incorporating privacy requirements early in the system development process. Specifically, PriS provides a set of concepts for modelling privacy requirements in the organisation domain and a systematic way-of-working for translating these requirements into system models. In this paper we present the PriS conceptual framework and a case tool that assist PriS way of working the PriS-Tool. Specifically, PriS-Tool assist developers by offering design capabilities of the organization's goal-process model, helps them to monitor the impact of privacy requirements on organisation's goals and processes, suggests them a set of implementation techniques for the realization of the privacy related processes and offers guidance throughout this process.




Security, Privacy, Requirements, Requirements Engineering, Privacy Requirements Engineering, Formal, Formal Privacy, Design, Information Systems, Case Tool, PriS, PriS-Tool




Anonymizer (2008), 'Anonymizer Tool', available at, 10 April 2008.

Bennett, K. and Grothoff, C. (2003), 'GAP-Practical Anonymous networking', Proceeding of the Workshop on PET 2003 Privacy Enhancing Technologies, Dresden, Germany.

Cannon, J.,C. (2004), Privacy, What Developers and IT Professionals Should Know, Addison-Wesley.

Chaum, D. (1981), "Untraceable Electronic Mail, return Addresses, and Digital Pseudonyms", Communications of the ACM, 24(2): 84-88.

Chaum, D. (1985), "Security without identification: Transactions Systems to make Big Brother Obsolete", Communications of the ACM, 28(10): 1030-1044.

Chaum, D. (1988), "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability", Journal of Cryptology, 1(1): 65-75.

Dingledine, R., Mathewson, N. and Syverson, P. (2004), 'Tor: The Second-Generator Onion Router', Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA.

Fischer-Hübner, S. (2001), IT-Security and Privacy, Design and Use of Privacy Enhancing Security Mechanisms, Lecture Notes in Computer Science Vol. 1958, Springer-Verlag, Berlin.

Goldschlag, D., Syverson, P. and Reed, M. (1999), "Onion Routing for anonymous and private Internet connections", Communications of the ACM, 42(2): 39-41.

Kalloniatis, C., Kavakli, E. and Gritzalis, S. (2004), 'Security Requiremenets Engineering for e-Government Applications', Proceedings of the DEXA EGOV'04 Conference, LNCS Vol. 3183. Springer, p.p. 66-71, Zaragosa, Spain.

Kalloniatis, C., Kavakli, E. and Gritzalis, S. (2008), "Addressing privacy requirements in system design: The PriS method", Requirements Engineering, 13(3): 241-255.

Kavakli, E., Gritzalis, S and Kalloniatis, C. (2007), "Protecting Privacy in System Design: The Electronic Voting Case", Transforming Government: People, Process and Policy, 1(4): 307-332.

Loucopoulos, P. and Kavakli, V. (1999), 'Enterprise Knowledge Management and Conceptual Modelling', Lecture Notes in Computer Science, 1565: 123-143.

Loucopoulos, P. (2000), 'From Information Modelling to Enterprise Modelling' In: Information Systems Engineering: State of the Art and Research Themes. Springer-Verlag, Berlin.

Ronald, K., Herman van G., Joris ter H., Overbeek, P., and Tellegen, R (2004), 'Privacy Enhancing Technologies, White paper for Decision Makers', Ministry of the Interior and Kingdom Relations, the Netherlands.

Reed, M., Syverson, P. and Goldschlag, D. (1998), "Anonymous connections and Onion Routing", IEEE Journal on Selected areas in Communications, 16(4): 482-494.

Reiter, K.M. and Rubin, D.A.(1998), "Crowds: Anonymity for Web Transactions", ACM Transactions of Information and System Security, 1(1): 66-92.

Reiter, K.M. and Rubin, D.A. (1999), "Anonymous Web Transactions with Crowds", Communications of the ACM, 42 (2): 32-38.

Pfitzmann, A. and Waidner, M. (1987), "Networks without user Observability", Computers & Security, 6(2): 158-166.

Shields, C. and Levine, N.B. (2000), 'A protocol for anonymous communication over the Internet', In: Samarati, P. and Jajodia, S. (eds.): Proceedings of the 7th ACM Conference on Computer and Communications Security. ACM Press New York NY.