Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Web Services Security
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Transforming data to satisfy privacy constraints
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Security and privacy issues of handheld and wearable wireless devices
Communications of the ACM - Why CS students need math
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy Policy Compliance for Web Services
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Using Privacy Policies to Protect Privacy in UBICOMP
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Provide Privacy for Mobile P2P Systems
ICDCSW '05 Proceedings of the First International Workshop on Mobility in Peer-to-Peer Systems - Volume 08
Tracking anonymous peer-to-peer VoIP calls on the internet
Proceedings of the 12th ACM conference on Computer and communications security
Trust management with delegation in grouped peer-to-peer communities
Proceedings of the eleventh ACM symposium on Access control models and technologies
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Trust-based privacy preservation for peer-to-peer data sharing
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
The growth of the Internet has been accompanied by the growth of web services (e.g. e-commerce, e-health). This increased use of web services has meant that more and more user personal information is being shared with web service providers, leading to the need to protect the privacy of web service users, as evidenced by the enactment of privacy legislation in many jurisdictions. Existing privacy policy approaches for privacy protection, such as making the service provider's privacy policy known to the user, or the use of P3P privacy policies, are inadequate. In the former case, the user cannot know for sure whether or not the provider will honor its policy; in the latter case, there is no flexibility for the user to specify her own policy for governing her own personal information - the provider's policy is the only one offered. This paper proposes the use of privacy controllers together with user privacy policies to overcome the limitations in current privacy policy approaches. An example to illustrate the approach is also given.