2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008
DOI: 10.1109/euc.2008.130
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Engine for Context-Aware Enterprise Application Services

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 17 publications
0
6
0
1
Order By: Relevance
“…• Confidentiality: This characteristic shows the degree to which a piece of information is sensitive to unrestricted use and must be defined as to whom and circumstances under which it may be revealed, within the context of the definition of privacy policies [6]. This attribute should encompass all privacy/confidentiality requirements stemming from legislation (e.g.…”
Section: The Metadata Of Context Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…• Confidentiality: This characteristic shows the degree to which a piece of information is sensitive to unrestricted use and must be defined as to whom and circumstances under which it may be revealed, within the context of the definition of privacy policies [6]. This attribute should encompass all privacy/confidentiality requirements stemming from legislation (e.g.…”
Section: The Metadata Of Context Informationmentioning
confidence: 99%
“…Westin [79] defines privacy as ''the claim of individuals, groups or institutions to determine for themselves, when, how and to what extent information about them is communicated to others''. The privacy concern is a multidimensional concept including collection, improper access, error and secondary usage of personal data [6,83]. Similarly, marketing rules and guidelines must be followed.…”
Section: Privacy Concernsmentioning
confidence: 99%
See 1 more Smart Citation
“…Blount et al [20] analyzed the task of satisfying preferences for exposing context data to authorized applications and individuals. They developed a role‐based, context‐dependent privacy model for enterprise domains.…”
Section: Examplesmentioning
confidence: 99%
“…The Context Privacy Engine (CPE) [8] extends the traditional Access Control List (ACL) mechanism with a set of context constraints that have to be evaluated to validate a particular privacy policy. Context constraints are used to define context conditions that are associated to either the context owner or the context requestor, using XQuery expressions.…”
Section: Context Privacy Enginementioning
confidence: 99%