Sciweavers

CORR
2011
Springer
165views Education» more  CORR 2011»
12 years 10 months ago
On the Semantics of Purpose Requirements in Privacy Policies
Privacy policies often place requirements on the purposes for which a governed entity may use personal information. For example, regulations, such as HIPAA, require that hospital ...
Michael Carl Tschantz, Anupam Datta, Jeannette M. ...
IEEESP
2010
101views more  IEEESP 2010»
13 years 2 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato
RE
2002
Springer
13 years 3 months ago
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy
Privacy has recently become a prominent issue in the context of electronic commerce websites. Increasingly, privacy policies posted on such websites are receiving considerable att...
Annie I. Antón, Julia Brande Earp, Angela R...
CACM
1999
108views more  CACM 1999»
13 years 3 months ago
Privacy Interfaces for Information Management
To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...
Tessa A. Lau, Oren Etzioni, Daniel S. Weld
DIM
2008
ACM
13 years 6 months ago
Proposal of privacy policy matching engine
We propose a system called "Privacy Policy Matching Engine", which enables a matching of a user's intention to provide his/her identity-related data and enterprises...
Takao Kojima, Yukio Itakura
FC
2006
Springer
94views Cryptology» more  FC 2006»
13 years 8 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
ETRICS
2006
13 years 8 months ago
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
To cope with the complex requirements imposed on the processing of privacy-sensitive data within enterprises, the use of automatic or semi-automatic tools is gradually becoming in...
Dominik Raub, Rainer Steinwandt
DEON
2010
Springer
13 years 9 months ago
Privacy Policies with Modal Logic: The Dynamic Turn
Abstract. Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defi...
Guillaume Aucher, Guido Boella, Leendert van der T...
HOTOS
2003
IEEE
13 years 9 months ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
PET
2004
Springer
13 years 9 months ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi