Sciweavers

IWC
2010
86views more  IWC 2010»
13 years 10 months ago
Enhancing privacy management support in instant messaging
Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. Inadequate support for...
Sameer Patil, Alfred Kobsa
CACM
2000
121views more  CACM 2000»
13 years 11 months ago
A broader approach to personalization
data model provides an abstract, conceptual framework; a concrete syntax is also required and XML is used for this purpose. The XML namespace mechanism serves to identify RDF Schem...
Ibrahim Cingil, Asuman Dogac, Ayca Azgin
CCS
2010
ACM
13 years 11 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
HUC
2010
Springer
14 years 16 days ago
Empirical models of privacy in location sharing
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
IJCAI
2003
14 years 24 days ago
A Semantic-Based User Privacy Protection Framework for Web Services
Abstract. Web service technology is an Internet-based distributed computing paradigm to address interoperability in heterogeneous distributed systems. In this paper, we present a p...
Arif Tumer, Asuman Dogac, Ismail Hakki Toroslu
DBSEC
2008
115views Database» more  DBSEC 2008»
14 years 27 days ago
P4A: A New Privacy Model for XML
Abstract. We propose a new privacy model for XML data called Privacy for All (P4A) to capture collectors privacy practice and data providers privacy preferences. Through P4A data c...
Angela Cristina Duta, Ken Barker
DBSEC
2007
151views Database» more  DBSEC 2007»
14 years 27 days ago
Location Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
SIGECOM
1999
ACM
125views ECommerce» more  SIGECOM 1999»
14 years 3 months ago
Privacy in e-commerce: examining user scenarios and privacy preferences
Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, b...
Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reag...
ESWS
2010
Springer
14 years 4 months ago
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web
Abstract. With increasing usage of Social Networks, giving users the possibility to establish access restrictions on their data and resources becomes more and more important. Howev...
Philipp Kärger, Wolf Siberski
ACMICEC
2003
ACM
90views ECommerce» more  ACMICEC 2003»
14 years 4 months ago
Automated analysis of P3P-enabled Web sites
The Platform for Privacy Preferences (P3P) provides a standard computer-readable format for privacy policies and a protocol that enables web browsers to read and process these pol...
Simon Byers, Lorrie Faith Cranor, David P. Kormann