— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
This paper proposes a collaborative approach for personal task management which is modeled as an alliance model. Alliance model is based on information sharing and collaboration o...
We propose a system called "Privacy Policy Matching Engine", which enables a matching of a user's intention to provide his/her identity-related data and enterprises...
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...