×
The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party.
A privacy architecture is introduced which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and ...
In this paper we present a novel architecture for extending the tradi- tional notion of access control to privacy-related data toward a holistic privacy.
The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party.
This work presents a novel model of privacy protection, complementing the notion of enterprise privacy with the incorporation of personal privacy towards a ...
Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing. 173-184. view. electronic edition via DOI · unpaywalled version ...
Section: Privacy. Article. Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing · Author Picture Susana Alcalde Bagüés ...
People also ask
Oct 22, 2024 · We present a novel model of privacy protection, complementing the notion of enterprise privacy with the incorporation of personal privacy ...
In this paper we address the realization of personal privacy control in pervasive computing. We argue that personal privacy demands differ ...
Records of Andreas Zeidler ; [c12] · Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing.TrustBus 2008: 173-184 ; [c10].