Digital signatures: can they be accepted as legal signatures in EDI?
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Do privacy seals in e-commerce really work?
Communications of the ACM - Mobile computing opportunities and challenges
Do consumers understand the role of privacy seals in e-commerce?
Communications of the ACM - The disappearing computer
Revisiting the role of web assurance seals in consumer trust
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Privacy Preserving Trust Authorization Framework Using XACML
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Next steps for security assertion markup language (saml)
Proceedings of the 2007 ACM workshop on Secure web services
A fresh look at the generalised mix framework
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Hi-index | 0.00 |
Ubiquitous service providers leverage miniaturised computing terminals equipped with wireless capabilities to avail new service models. These models are pivoted on personal and inexpensive terminals to customise services to individual preferences. Portability, small sizes and compact keyboards are few features popularising mobile terminals. Features enable storing and carrying of ever increasing proportions of personal data and ability to use them in service adaptations. Ubiquitous services automate deeper soliciting of personal data transparently without the need for user interactions. Transparent solicitations, acquisitions and handling of personal data legitimises privacy concerns regarding disclosures, retention and re-use of the data. This study presents a policy enforcement for ubiquitous services that safeguards handling of users personal data and monitors adherence to stipulated privacy policies. Enforcement structures towards usability and scalability are presented.