Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing. Alcalde Bagüés, S., Mitic, J., Zeidler, A., Tejada, M., Matias, I., & Fernandez Valdivielso, C. Volume 5185. Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing, pages 173-184. Springer, 2008.
Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing [link]Website  abstract   bibtex   
In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Today's laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.
@inBook{
 title = {Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing},
 type = {inBook},
 year = {2008},
 identifiers = {[object Object]},
 keywords = {access-control,privacy,ubicomp},
 pages = {173-184},
 volume = {5185},
 websites = {http://dx.doi.org/10.1007/978-3-540-85735-8_17},
 publisher = {Springer},
 city = {Berlin, Heidelberg},
 series = {Lecture Notes in Computer Science},
 chapter = {17},
 editors = {[object Object],[object Object],[object Object]},
 id = {58935f2d-fb1c-3ecc-ac4d-7299407a8a51},
 created = {2018-07-12T21:32:36.564Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:32:36.564Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {bagues:obligations},
 source_type = {incollection},
 private_publication = {false},
 abstract = {In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Today's laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.},
 bibtype = {inBook},
 author = {Alcalde Bagüés, Susana and Mitic, Jelena and Zeidler, Andreas and Tejada, Marta and Matias, Ignacio and Fernandez Valdivielso, Carlos},
 book = {Trust, Privacy and Security in Digital Business}
}

Downloads: 0