Sciweavers

PET
2004
Springer
14 years 3 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
PET
2004
Springer
14 years 3 months ago
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
Abstract. Although the number of online privacy policies is increasing, it remains difficult for Internet users to understand them, let alone to compare policies across sites or i...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
PET
2004
Springer
14 years 3 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
PET
2004
Springer
14 years 3 months ago
Reputable Mix Networks
We define a new type of mix network that offers a reduced form of robustness: the mixnet can prove that every message it outputs corresponds to an input submitted by a player wit...
Philippe Golle
PET
2004
Springer
14 years 3 months ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi
Security Privacy
Top of PageReset Settings