• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,049
Next 10 →

Privacy Enforcement Controller

by unknown authors
"... Ambient Intelligence (AmI) involves extensive and invisible integration of computer technologies in people´s daily lives: Smart Sensors, Smart Phones, ..."
Abstract - Add to MetaCart
Ambient Intelligence (AmI) involves extensive and invisible integration of computer technologies in people´s daily lives: Smart Sensors, Smart Phones,

Privacy Injector - Automated Privacy Enforcement Through Aspects

by Chris Vanden Berghe, Matthias Schunter - IN WORKSHOP ON PRIVACY ENHANCING TECHNOLOGIES , 2006
"... Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without co ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without

Privacy Enforcement in Data Analysis Workflows

by Yolanda Gil, William K. Cheung, Varun Ratnakar, Kai-kin Chan
"... Collaborative e-Science projects commonly require data analysis to be performed on distributed data sets which may contain sensitive information. In addition to the credential-based privacy protection, ensuring proper handling of computerized data for disclosure and analysis is particularly essenti ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
essential in e-Science. In this paper, we propose a semantic approach for enforcing it through workflow systems. We define privacy preservation and analysis-relevant terms as ontologies and incorporate them into a proposed policy framework to represent and enforce the policies. We believe that workflow

PEEP - Privacy Enforcement in Email Project

by Narjes Boufaden William, William Elazmeh, Stan Matwin, Nathalie Japckowicz , 2005
"... Breaching information privacy is a critical problem where legal remedies intervene only after the fact rather than prevent it. This paper presents an organizational privacy compliance engine that monitors outgoing emails to detect breaches of a privacy policy in an organization. The PEEP system empl ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Breaching information privacy is a critical problem where legal remedies intervene only after the fact rather than prevent it. This paper presents an organizational privacy compliance engine that monitors outgoing emails to detect breaches of a privacy policy in an organization. The PEEP system

Privacy Enforcement for Distributed Healthcare Queries

by Michael Siegenthaler, Ken Birman
"... Abstract—In the healthcare industry and others, sensitive private information must be stored and shared between various organizations in the course of running their business. We have developed an architecture in which distributed data can be queried as if it resided in a single centralized database, ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
, while revealing minimal information beyond the answer to the query. In this paper we review the architecture and show how queries can be filtered to enforce user-specified privacy policies. We present a system for tracking information flow that is flexible enough to permit revealing sensitive data

Privacy enforcement with HP Select Access for regulatory compliance

by Marco Casassa Mont, Robert Thyne, Pete Bramhall , 2005
"... privacy, privacy enforcement, access control, privacy-aware access control, regulatory compliance, data governance, policy management Regulatory compliance is a hot topic for enterprises. The increasing number of laws, including SOX, GLB, HIPAA and various governmental directives on data protection ..."
Abstract - Cited by 17 (3 self) - Add to MetaCart
privacy, privacy enforcement, access control, privacy-aware access control, regulatory compliance, data governance, policy management Regulatory compliance is a hot topic for enterprises. The increasing number of laws, including SOX, GLB, HIPAA and various governmental directives on data protection

A bayesian approach to privacy enforcement in smartphones.

by Omer Tripp , Omer Tripp , Julia Rubin - In USENIX Security, , 2014
"... Abstract Mobile apps often require access to private data, such as the device ID or location. At the same time, popular platforms like Android and iOS have limited support for user privacy. This frequently leads to unauthorized disclosure of private information by mobile apps, e.g. for advertising ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
and analytics purposes. This paper addresses the problem of privacy enforcement in mobile systems, which we formulate as a classification problem: When arriving at a privacy sink (e.g., database update or outgoing web message), the runtime system must classify the sink's behavior as either legitimate

A Distributed Privacy Enforcement Architecture based on Kerberos

by Peter Langendoerfer, Krzysztof Piotrowski, Michael Maaser - WSEAS Transactions on Communications
"... Abstract:- In this paper we propose a distributed privacy enforcement architecture. Each mobile client runs its own privacy negotiation unit as well as its own Kerberos ticket granting server. The privacy negotiation units are compatible with the P3P standard, but allow mutual exchange of privacy po ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract:- In this paper we propose a distributed privacy enforcement architecture. Each mobile client runs its own privacy negotiation unit as well as its own Kerberos ticket granting server. The privacy negotiation units are compatible with the P3P standard, but allow mutual exchange of privacy

Distributed constraint satisfaction and optimization with privacy enforcement

by Marius C. Silaghi, Debasis Mitra - In 3rd IC on Intelligent Agent Technology , 2004
"... Several naturally distributed negotiation/cooperation problems with privacy requirements can be modeled within the distributed constraint satisfaction framework, where the constraints are secrets of the participants. Most of the existing techniques aim at various tradeoffs between complexity and pri ..."
Abstract - Cited by 49 (10 self) - Add to MetaCart
Several naturally distributed negotiation/cooperation problems with privacy requirements can be modeled within the distributed constraint satisfaction framework, where the constraints are secrets of the participants. Most of the existing techniques aim at various tradeoffs between complexity

Contextual Integrity and Privacy Enforcing Norms for Virtual Communities

by Yann Krupa, Laurent Vercouter
"... Abstract. Contextual Integrity has been proposed to define privacy in an unusual way. Most approaches take into account a sensitivity level or a “privacy circle”: the information is said to be private or public and to be constrained to a given group of agents, e.g. “my friends”. In the oppo-site, Co ..."
Abstract - Add to MetaCart
-site, Contextual Integrity states that any information transmission can trigger a privacy violation depending on the context of the transmission. We use this theory to describe a framework that one can use in an open and decentralised virtual community to handle privacy in a socially en-forced way. This paper
Next 10 →
Results 1 - 10 of 1,049
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University