Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing. Alcalde Bagüés, S., Mitic, J., Zeidler, A., Tejada, M., Matias, I., & Fernandez Valdivielso, C. Volume 5185. Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing, pages 173-184. Springer, 2008. Website abstract bibtex In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Today's laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.
@inBook{
title = {Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing},
type = {inBook},
year = {2008},
identifiers = {[object Object]},
keywords = {access-control,privacy,ubicomp},
pages = {173-184},
volume = {5185},
websites = {http://dx.doi.org/10.1007/978-3-540-85735-8_17},
publisher = {Springer},
city = {Berlin, Heidelberg},
series = {Lecture Notes in Computer Science},
chapter = {17},
editors = {[object Object],[object Object],[object Object]},
id = {58935f2d-fb1c-3ecc-ac4d-7299407a8a51},
created = {2018-07-12T21:32:36.564Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:32:36.564Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {bagues:obligations},
source_type = {incollection},
private_publication = {false},
abstract = {In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Today's laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.},
bibtype = {inBook},
author = {Alcalde Bagüés, Susana and Mitic, Jelena and Zeidler, Andreas and Tejada, Marta and Matias, Ignacio and Fernandez Valdivielso, Carlos},
book = {Trust, Privacy and Security in Digital Business}
}
Downloads: 0
{"_id":"uye9vXcGiY2GpRgMW","bibbaseid":"alcaldebags-mitic-zeidler-tejada-matias-fernandezvaldivielso-obligationsbuildingabridgebetweenpersonalandenterpriseprivacyinpervasivecomputing-2008","downloads":0,"creationDate":"2019-02-15T15:15:02.046Z","title":"Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing","author_short":["Alcalde Bagüés, S.","Mitic, J.","Zeidler, A.","Tejada, M.","Matias, I.","Fernandez Valdivielso, C."],"year":2008,"bibtype":"inBook","biburl":null,"bibdata":{"title":"Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing","type":"inBook","year":"2008","identifiers":"[object Object]","keywords":"access-control,privacy,ubicomp","pages":"173-184","volume":"5185","websites":"http://dx.doi.org/10.1007/978-3-540-85735-8_17","publisher":"Springer","city":"Berlin, Heidelberg","series":"Lecture Notes in Computer Science","chapter":"17","editors":"[object Object],[object Object],[object Object]","id":"58935f2d-fb1c-3ecc-ac4d-7299407a8a51","created":"2018-07-12T21:32:36.564Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:32:36.564Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"bagues:obligations","source_type":"incollection","private_publication":false,"abstract":"In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Today's laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.","bibtype":"inBook","author":"Alcalde Bagüés, Susana and Mitic, Jelena and Zeidler, Andreas and Tejada, Marta and Matias, Ignacio and Fernandez Valdivielso, Carlos","book":"Trust, Privacy and Security in Digital Business","bibtex":"@inBook{\n title = {Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing},\n type = {inBook},\n year = {2008},\n identifiers = {[object Object]},\n keywords = {access-control,privacy,ubicomp},\n pages = {173-184},\n volume = {5185},\n websites = {http://dx.doi.org/10.1007/978-3-540-85735-8_17},\n publisher = {Springer},\n city = {Berlin, Heidelberg},\n series = {Lecture Notes in Computer Science},\n chapter = {17},\n editors = {[object Object],[object Object],[object Object]},\n id = {58935f2d-fb1c-3ecc-ac4d-7299407a8a51},\n created = {2018-07-12T21:32:36.564Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:32:36.564Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {bagues:obligations},\n source_type = {incollection},\n private_publication = {false},\n abstract = {In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Today's laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.},\n bibtype = {inBook},\n author = {Alcalde Bagüés, Susana and Mitic, Jelena and Zeidler, Andreas and Tejada, Marta and Matias, Ignacio and Fernandez Valdivielso, Carlos},\n book = {Trust, Privacy and Security in Digital Business}\n}","author_short":["Alcalde Bagüés, S.","Mitic, J.","Zeidler, A.","Tejada, M.","Matias, I.","Fernandez Valdivielso, C."],"urls":{"Website":"http://dx.doi.org/10.1007/978-3-540-85735-8_17"},"bibbaseid":"alcaldebags-mitic-zeidler-tejada-matias-fernandezvaldivielso-obligationsbuildingabridgebetweenpersonalandenterpriseprivacyinpervasivecomputing-2008","role":"author","keyword":["access-control","privacy","ubicomp"],"downloads":0},"search_terms":["obligations","building","bridge","between","personal","enterprise","privacy","pervasive","computing","alcalde bagüés","mitic","zeidler","tejada","matias","fernandez valdivielso"],"keywords":["access-control","privacy","ubicomp"],"authorIDs":[]}