Privacy intrusion detection using dynamic Bayesian networks
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Super-sticky and declassifiable release policies for flexible information dissemination control
Proceedings of the 5th ACM workshop on Privacy in electronic society
A Bayesian Network Approach to Detecting Privacy Intrusion
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Enforcing "sticky" security policies throughout a distributed application
Proceedings of the 2008 workshop on Middleware security
Foundations for group-centric secure information sharing models
Proceedings of the 14th ACM symposium on Access control models and technologies
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
PAES: Policy-Based Authority Evaluation Scheme
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
A client-based privacy manager for cloud computing
Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
Web-Traveler Policies for Images on Social Networks
World Wide Web
User-centric identity governance across domain boundaries
Proceedings of the 5th ACM workshop on Digital identity management
An advanced policy based authorisation infrastructure
Proceedings of the 5th ACM workshop on Digital identity management
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Data Protection-Aware Design for Cloud Services
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Accountability as a Way Forward for Privacy Protection in the Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
An opportunistic authority evaluation scheme for data security in crisis management scenarios
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Fine-grained sticky provenance architecture for office documents
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Foundations of security analysis and design IV
Assurance for federated identity management
Journal of Computer Security - Digital Identity Management (DIM 2007)
Secure cross-domain data sharing architecture for crisis management
Proceedings of the tenth annual ACM workshop on Digital rights management
A labelling system for derived data control
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
A persistent data tracking mechanism for user-centric identity governance
Identity in the Information Society
Distributed middleware enforcement of event flow security policy
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
A privacy-aware localization service for healthcare environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A study on scalability of services and privacy issues in cloud computing
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Enforcing sticky policies with TPM and virtualization
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
POCKET: A tool for protecting children's privacy online
Decision Support Systems
Cyber-physical systems: imminent challenges
Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management
Using AOP-based enforcement of prioritised XACML policies for location privacy
International Journal of Internet Technology and Secured Transactions
End-to-end policy based encryption techniques for multi-party data management
Computer Standards & Interfaces
Web Intelligence and Agent Systems
Hi-index | 0.00 |
Digital identities and profiles are precious assets. Onone hand they enable users to engage in transactions andinteractions on the Internet. On the other hand, abusesand leakages of this information could violate the privacyof their owners, sometimes with serious consequences.Nowadays most of the people have limitedunderstanding of security and privacy policies whenapplied to their confidential information and little controlover the destiny of this information once it has beendisclosed to third parties. In most cases this is a matter oftrust.This document describes an innovative approach andrelated mechanisms to enforce users' privacy by puttingusers in control and making organizations moreaccountable. As part of our ongoing research activity, weintroduce a technical solution based on sticky policiesand tracing services that leverages Identifier-basedEncryption (IBE) and TCPA technologies. Work is inprogress to build a full working prototype and deploy it ina real-life environment.