2003 Symposium on Applications and the Internet, 2003. Proceedings.
DOI: 10.1109/saint.2003.1183071
|View full text |Cite
|
Sign up to set email alerts
|

Bilateral e-services negotiation under uncertainty

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 37 publications
(22 citation statements)
references
References 11 publications
0
22
0
Order By: Relevance
“…An algorithm has been developed to guide the implementation of privacy contracts but this algorithm is not adapted to implement privacy contracts when developing web services applications. Relevant works in the area of privacy negotiation are described in [6,15]. No evolution of the privacy policy is taking into account.…”
Section: Related Workmentioning
confidence: 99%
“…An algorithm has been developed to guide the implementation of privacy contracts but this algorithm is not adapted to implement privacy contracts when developing web services applications. Relevant works in the area of privacy negotiation are described in [6,15]. No evolution of the privacy policy is taking into account.…”
Section: Related Workmentioning
confidence: 99%
“…If compatible the user is told he/she can proceed to interact (sharing or observing) with the devices in the environment as determined by the user's privacy policies. If incompatible, there are three possibilities: 1) the user is told which clauses in his/her policy are incompatible and consequently, with which devices he/she can interact (possibly none, this is similar to the way P3P policies for websites work [14]), 2) the user can negotiate with the organization to resolve all the incompatibilities (similar to [10,11] , these interfaces will have to be commensurate with the computational capability (for these devices the quantity of shared private information will be limited too). Figure 1 illustrates our proposed UNICOMP model.…”
Section: Ubicomp Model For Privacy Protection Using Privacy Policiesmentioning
confidence: 99%
“…"HWW" stands for hand-held/wearable wireless devices. Finally, there are works targeted at Internet e-services environments dealing with privacy policy derivation [9], privacy policy negotiation [10,11], privacy policy compliance [12], and treating the protection of privacy as a kind of rights management [13].…”
Section: Introductionmentioning
confidence: 99%
“…Privacy policy negotiation is fully described in Yee & Korba (2003a) and Yee & Korba (2003b); it is outside the scope of this paper. Security policy negotiation is entered once the consumer has determined which service she wants to use.…”
Section: Security Policy Negotiationmentioning
confidence: 99%
“…We have extended a prototype that we had developed for privacy policy negotiation (Yee & Korba, 2003a;Yee & Korba, 2003b) so that it can be used for security policy negotiation. The prototype is based on a peer-to-peer architecture programmed in JADE (Java Agent Development Framework) (Telecom Italia Lab).…”
Section: Prototype For Security Policy Negotiationmentioning
confidence: 99%