Designing trust into online experiences
Communications of the ACM
Privacy-Enabled Services for Enterprises
DEXA '02 Proceedings of the 13th International Workshop on Database and Expert Systems Applications
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Tailoring Privacy to Users' Needs
UM '01 Proceedings of the 8th International Conference on User Modeling 2001
Web Privacy with P3p
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
What do they "indicate?": evaluating security and privacy indicators
interactions - A contradiction in terms?
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Towards automated evaluation of trust constraints
iTrust'06 Proceedings of the 4th international conference on Trust Management
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Accountability as a Way Forward for Privacy Protection in the Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Hi-index | 0.00 |
Personal identifying information is released without much control from the end user to service providers. We describe a system to scrutinize the stated claims of a service provider on safeguarding PII by interrogating their infrastructure. We attempt to empower end users by providing means to communicate their privacy concerns in a common language understood by the service provider, allowing them to set baseline privacy practices for service providers to adhere to, and providing a means of retrieving information from the service provider in the common language to base their PII release decisions.