The essence of functional programming
POPL '92 Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Software Metrics: A Rigorous and Practical Approach
Software Metrics: A Rigorous and Practical Approach
POPL '03 Proceedings of the 30th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Higher-Order and Symbolic Computation
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
Advanced Clone-Analysis to Support Object-Oriented System Refactoring
WCRE '00 Proceedings of the Seventh Working Conference on Reverse Engineering (WCRE'00)
Clone Detection Using Abstract Syntax Trees
ICSM '98 Proceedings of the International Conference on Software Maintenance
Web Privacy with P3p
Static profile and dynamic behavior of COBOL programs
ACM SIGPLAN Notices
Lessons learned from real DSL experiments
Science of Computer Programming - Methods of software design: Techniques and applications
Extending Relational Database Systems to Automatically Enforce Privacy Policies
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
OOPSLA '05 Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
SWS '04 Proceedings of the 2004 workshop on Secure web service
When and how to develop domain-specific languages
ACM Computing Surveys (CSUR)
An analysis of P3P-enabled web sites among top-20 search results
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Understanding the shape of Java software
Proceedings of the 21st annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications
An empirical study of Java bytecode programs
Software—Practice & Experience
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Software Engineering
Electronic Commerce Research and Applications
Empirical evaluation of clone detection using syntax suffix trees
Empirical Software Engineering
Privacy policy enforcement in enterprises with identity management solutions
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations
ACM Transactions on the Web (TWEB)
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Science of Computer Programming
A "nutrition label" for privacy
Proceedings of the 5th Symposium on Usable Privacy and Security
Escape from the matrix: lessons from a case-study in access-control requirements
Proceedings of the 5th Symposium on Usable Privacy and Security
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Enforcing P3P policies using a digital rights management system
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Policy framework for security and privacy management
IBM Journal of Research and Development
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
Proceedings of the FSE/SDP workshop on Future of software engineering research
ENDORSE: a legal technical framework for privacy preserving data management
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Papel: Provenance-Aware Policy Definition and Execution
IEEE Internet Computing
Empirical language analysis in software linguistics
SLE'10 Proceedings of the Third international conference on Software language engineering
Capturing P3P semantics using an enforceable lattice-based structure
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
The essence of dataflow programming
APLAS'05 Proceedings of the Third Asian conference on Programming Languages and Systems
Language-Based enforcement of privacy policies
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
The essence of data access in Cω: the power is in the dot!
ECOOP'05 Proceedings of the 19th European conference on Object-Oriented Programming
An empirical study of APL programs
Computer Languages
XML privacy protection model based on cloud storage
Computer Standards & Interfaces
Hi-index | 0.00 |
Their is growing recognition that users of web-based systems want to understand, if not control, what customer's data is stored by whom, for what purpose, for what duration, and with whom it is shared. We inform current language-based privacy efforts with an empirical study of P3P--the W3C domain-specific language for privacy policies. We use methods of software language engineering to study usage profiles, correctness of policies, metrics, cloning, and language extensions. The study supports the conclusion that P3P's approach to policy validation is too weak to ensure correct use of the language. The study also discovers common, dominating policies, which may suggest a simpler approach to web privacy. Further, the study investigates a range of metrics for policies in an attempt to discover particularly interesting or complex policies. Finally, the study also attempts to discover symptoms of the need for extending the P3P language, but the found results are not conclusive here.