Sciweavers

233 search results - page 4 / 47
» Enforcement of a P3P Privacy Policy
Sort
View
POPL
2012
ACM
12 years 1 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
POLICY
2009
Springer
14 years 24 days ago
Strong and Weak Policy Relations
—Access control and privacy policy relations tend to focus on decision outcomes and are very sensitive to defined terms and state. Small changes or updates to a policy language ...
Michael J. May, Carl A. Gunter, Insup Lee, Steve Z...
WPES
2004
ACM
13 years 11 months ago
Soft blocking: flexible blocker tags on the cheap
A “blocker” tag is a form of privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individua...
Ari Juels, John G. Brainard
OTM
2007
Springer
14 years 12 days ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional bene...
Sören Preibusch
CODASPY
2012
12 years 2 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner