Advances, Systems and Applications
ID | Description |
---|---|
CO | Basic system requirements |
CO1 | System as central authority of trust (“Trusted Party”) |
CO2 | Use of services offered at the market, which need little user configuration |
CO3 | Basic use of system without user costs |
CO4 | Alternative selection of data security level |
CO5 | Provide possibility for data encryption on storage medium |
CO6 | Integration of user management |
CO7 | Complete availability of necessary resources in the form of data |
DS | Data Security |
DS1 | Data security has to be highlighted visually for the user |
DS2 | Control over data usage with an option for (automatic) deletion |
DS3 | Simple rights management to avoid conflicts |
DS4 | User anonymity within the system |
DS5 | Personal data protection through user or authority for data management |
DS6 | Attached protection policies for data |
DS7 | Co-data security for jointly created user data (Co-Privacy) |
DS8 | Recommendation for data security settings |
TR | Trust |
TR1 | Centralization of trust |
TR2 | Creation of trust of the user (i.e., via support from other user) |
RM | Relationship Management |
RM1 | Support for contact management |
RM2 | Automatic derivation of relations |
SY | System Design |
SY1 | High number of data sources through a high abstraction of the access layer |
SY2 | Concept for the availability and non-availability of user data |
SY3 | System robustness against attacks and incorrect data |
SY4 | Fine granular |
SY5 | Inoperability |
SY6 | Rights and interaction management based on relationships |
SY7 | High-performance search within the network |
SY8 | Self-presentation management (monitoring/feedback) |