Results 1 - 10
of
1,049
Privacy Enforcement Controller
"... Ambient Intelligence (AmI) involves extensive and invisible integration of computer technologies in people´s daily lives: Smart Sensors, Smart Phones, ..."
Abstract
- Add to MetaCart
Ambient Intelligence (AmI) involves extensive and invisible integration of computer technologies in people´s daily lives: Smart Sensors, Smart Phones,
Privacy Injector - Automated Privacy Enforcement Through Aspects
- IN WORKSHOP ON PRIVACY ENHANCING TECHNOLOGIES
, 2006
"... Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without co ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without
Privacy Enforcement in Data Analysis Workflows
"... Collaborative e-Science projects commonly require data analysis to be performed on distributed data sets which may contain sensitive information. In addition to the credential-based privacy protection, ensuring proper handling of computerized data for disclosure and analysis is particularly essenti ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
essential in e-Science. In this paper, we propose a semantic approach for enforcing it through workflow systems. We define privacy preservation and analysis-relevant terms as ontologies and incorporate them into a proposed policy framework to represent and enforce the policies. We believe that workflow
PEEP - Privacy Enforcement in Email Project
, 2005
"... Breaching information privacy is a critical problem where legal remedies intervene only after the fact rather than prevent it. This paper presents an organizational privacy compliance engine that monitors outgoing emails to detect breaches of a privacy policy in an organization. The PEEP system empl ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Breaching information privacy is a critical problem where legal remedies intervene only after the fact rather than prevent it. This paper presents an organizational privacy compliance engine that monitors outgoing emails to detect breaches of a privacy policy in an organization. The PEEP system
Privacy Enforcement for Distributed Healthcare Queries
"... Abstract—In the healthcare industry and others, sensitive private information must be stored and shared between various organizations in the course of running their business. We have developed an architecture in which distributed data can be queried as if it resided in a single centralized database, ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
, while revealing minimal information beyond the answer to the query. In this paper we review the architecture and show how queries can be filtered to enforce user-specified privacy policies. We present a system for tracking information flow that is flexible enough to permit revealing sensitive data
Privacy enforcement with HP Select Access for regulatory compliance
, 2005
"... privacy, privacy enforcement, access control, privacy-aware access control, regulatory compliance, data governance, policy management Regulatory compliance is a hot topic for enterprises. The increasing number of laws, including SOX, GLB, HIPAA and various governmental directives on data protection ..."
Abstract
-
Cited by 17 (3 self)
- Add to MetaCart
privacy, privacy enforcement, access control, privacy-aware access control, regulatory compliance, data governance, policy management Regulatory compliance is a hot topic for enterprises. The increasing number of laws, including SOX, GLB, HIPAA and various governmental directives on data protection
A bayesian approach to privacy enforcement in smartphones.
- In USENIX Security,
, 2014
"... Abstract Mobile apps often require access to private data, such as the device ID or location. At the same time, popular platforms like Android and iOS have limited support for user privacy. This frequently leads to unauthorized disclosure of private information by mobile apps, e.g. for advertising ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
and analytics purposes. This paper addresses the problem of privacy enforcement in mobile systems, which we formulate as a classification problem: When arriving at a privacy sink (e.g., database update or outgoing web message), the runtime system must classify the sink's behavior as either legitimate
A Distributed Privacy Enforcement Architecture based on Kerberos
- WSEAS Transactions on Communications
"... Abstract:- In this paper we propose a distributed privacy enforcement architecture. Each mobile client runs its own privacy negotiation unit as well as its own Kerberos ticket granting server. The privacy negotiation units are compatible with the P3P standard, but allow mutual exchange of privacy po ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract:- In this paper we propose a distributed privacy enforcement architecture. Each mobile client runs its own privacy negotiation unit as well as its own Kerberos ticket granting server. The privacy negotiation units are compatible with the P3P standard, but allow mutual exchange of privacy
Distributed constraint satisfaction and optimization with privacy enforcement
- In 3rd IC on Intelligent Agent Technology
, 2004
"... Several naturally distributed negotiation/cooperation problems with privacy requirements can be modeled within the distributed constraint satisfaction framework, where the constraints are secrets of the participants. Most of the existing techniques aim at various tradeoffs between complexity and pri ..."
Abstract
-
Cited by 49 (10 self)
- Add to MetaCart
Several naturally distributed negotiation/cooperation problems with privacy requirements can be modeled within the distributed constraint satisfaction framework, where the constraints are secrets of the participants. Most of the existing techniques aim at various tradeoffs between complexity
Contextual Integrity and Privacy Enforcing Norms for Virtual Communities
"... Abstract. Contextual Integrity has been proposed to define privacy in an unusual way. Most approaches take into account a sensitivity level or a “privacy circle”: the information is said to be private or public and to be constrained to a given group of agents, e.g. “my friends”. In the oppo-site, Co ..."
Abstract
- Add to MetaCart
-site, Contextual Integrity states that any information transmission can trigger a privacy violation depending on the context of the transmission. We use this theory to describe a framework that one can use in an open and decentralised virtual community to handle privacy in a socially en-forced way. This paper
Results 1 - 10
of
1,049