Flexible authentication of XML documents
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Evaluation of Certificate Revocation Policies: OCSP vs. Overissued-CRL
DEXA '02 Proceedings of the 13th International Workshop on Database and Expert Systems Applications
Secrecy, authentication, and public key systems.
Secrecy, authentication, and public key systems.
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Securing XML data in third-party distribution systems
Proceedings of the 14th ACM international conference on Information and knowledge management
Internet opt-in and opt-out: investigating the roles of frames, defaults and privacy concerns
Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: achievements, challenges & the future
Preventing unofficial information propagation
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Traceable and automatic compliance of privacy policies in federated digital identity management
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Information flow control to secure dynamic web service composition
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Data Protection-Aware Design for Cloud Services
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Context-aware privacy design pattern selection
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Consent reconsidered; reframing consent for ubiquitous computing systems
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Adaptive data protection in distributed systems
Proceedings of the third ACM conference on Data and application security and privacy
An informed view on consent for UbiComp
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Adaptive data management for self-protecting objects in cloud computing systems
Proceedings of the 8th International Conference on Network and Service Management
Hi-index | 0.00 |
We have identified the following three problems for the processing of aggregated personal information with respect to privacy preferences: Unverifiable proof of consent, unverifiable proof of consent for aggregated personal data, and no verification if the consent is still established. We constructed a solution based on a hash tree structure and digitally signed only the hash tree's root value. Thus, a verifiable signature can be retained even if data items are omitted and a valid signature serves as signal of consent. To re-assure that no change of consent has taken place we propose the use of certificate revocation mechanisms. As a side-effect these mechanisms allow to maintain a record of personal data usage and thus creates a win-win situation for both parties involved.