Sciweavers

806 search results - page 8 / 162
» Privacy Policy Referencing
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha...
CCS
2006
ACM
13 years 11 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
VLDB
2004
ACM
138views Database» more  VLDB 2004»
14 years 3 months ago
Limiting Disclosure in Hippocratic Databases
We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semanti...
Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Ra...
DEON
2010
Springer
14 years 2 months ago
Privacy Policies with Modal Logic: The Dynamic Turn
Abstract. Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defi...
Guillaume Aucher, Guido Boella, Leendert van der T...
CHI
2010
ACM
14 years 4 months ago
Generating default privacy policies for online social networks
Default privacy policies have a significant impact on the overall dynamics and success of online social networks, as users tend to keep their initial privacy policies. In this wor...
Eran Toch, Norman M. Sadeh, Jason I. Hong