The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party.
A privacy architecture is introduced which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and ...
In this paper we present a novel architecture for extending the tradi- tional notion of access control to privacy-related data toward a holistic privacy.
The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party.
[PDF] Enabling Personal Privacy for Pervasive Computing ...
www.semanticscholar.org › paper › Enab...
This work presents a novel model of privacy protection, complementing the notion of enterprise privacy with the incorporation of personal privacy towards a ...
Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing. 173-184. view. electronic edition via DOI · unpaywalled version ...
Section: Privacy. Article. Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing · Author Picture Susana Alcalde Bagüés ...
People also ask
What are the principles of pervasive computing?
What is the role of security and privacy in the enterprise architecture?
Oct 22, 2024 · We present a novel model of privacy protection, complementing the notion of enterprise privacy with the incorporation of personal privacy ...
In this paper we address the realization of personal privacy control in pervasive computing. We argue that personal privacy demands differ ...
Records of Andreas Zeidler ; [c12] · Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing.TrustBus 2008: 173-184 ; [c10].