Sciweavers

ESORICS
2004
Springer
13 years 10 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
ATAL
2004
Springer
13 years 10 months ago
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
We describe a new smart meeting room system called EasyMeeting that explores the use of FIPA agent technologies, Semantic Web ontologies, logic reasoning, and security and privacy...
Harry Chen, Filip Perich, Dipanjan Chakraborty, Ti...
WPES
2004
ACM
13 years 10 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
IEEESCC
2005
IEEE
13 years 10 months ago
Designing Privacy Policies for Adopting RFID in the Retail Industry
Radio Frequency Identification (RFID) technologies can potentially improve the productivity of retailers. In this paper, we propose a role-based, enterprise-level, RFID-oriented p...
Haifei Li, Patrick C. K. Hung, Jia Zhang, David Ah...
ICDE
2005
IEEE
63views Database» more  ICDE 2005»
13 years 10 months ago
Privacy Contracts as an Extension of Privacy Policies
Individuals are becoming increasingly concerned regarding the protection of their personal information. In an attempt to ease the privacy concerns of individuals, organisations pu...
Hendrik J. G. Oberholzer, Martin S. Olivier
SOUPS
2006
ACM
13 years 10 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
SOUPS
2006
ACM
13 years 10 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
SEMWEB
2007
Springer
13 years 10 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
OTM
2007
Springer
13 years 10 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional beneï...
Sören Preibusch
ESORICS
2007
Springer
13 years 10 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo