IEEE Transactions on Software Engineering
Data mining: concepts and techniques
Data mining: concepts and techniques
Anomaly-based intrusion detection: privacy concerns and other problems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Internet Technology (TOIT)
Privacy-Enabled Services for Enterprises
DEXA '02 Proceedings of the 13th International Workshop on Database and Expert Systems Applications
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Computational disclosure control: a primer on data privacy protection
Computational disclosure control: a primer on data privacy protection
RFID: A Technical Overview and Its Application to the Enterprise
IT Professional
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Multimedia surveillance systems
Proceedings of the third ACM international workshop on Video surveillance & sensor networks
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
Enhancing consumer privacy in the liberty alliance identity federation and web services frameworks
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
A systemic approach to automate privacy policy enforcement in enterprises
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
PCP: privacy-aware context profile towards context-aware application development
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Relationship Based Privacy Management for Ubiquitous Society
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
Role-Based and Service-Oriented Security Management in the E-Government Environment
EGOV '09 Proceedings of the 8th International Conference on Electronic Government
Privacy in a Semantic Cloud: What's Trust Got to Do with It?
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
A purpose-based privacy-aware system using privacy data graph
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Privacy-enhanced management of ubiquitous health monitoring data
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Using middleware as a certifying authority in LBS applications
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
A privacy-aware access control model for distributed network monitoring
Computers and Electrical Engineering
Hi-index | 0.00 |
The issue of user privacy is constantly in spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provision. In fact, recent advances in mobile communications, location and sensing technologies and data processing are boosting the deployment of context-aware personalized services and the creation of smart environments; but at the same time, they pose a serious risk on individuals' privacy rights. Although technology makes the collection of data easy, its protection against abuse is left to data protection legislation. However, the privacy requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down in technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and avoid the misuse of personal data, this paper discusses an architectural proposal for a middleware system that will enforce protection of user privacy through technical means. The proposed architecture mediates between the users, the service providers and the law, constituting a middleware shield for individuals' personal data.