Proceedings. IEEE International Conference on Web Services, 2004. 2004
DOI: 10.1109/icws.2004.1314735
|View full text |Cite
|
Sign up to set email alerts
|

Privacy policy compliance for Web services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(27 citation statements)
references
References 7 publications
0
27
0
Order By: Relevance
“…Domain expert must understand the changes and reconfigure the service description as per the modifications of public policy in view of protecting the e-service consumers [28], for e.g. privacy policy [46]. So information systems need to support internal work within a government's boundaries, service customers through digital interfaces and leverage digital relationships among social partners [38].…”
Section: Introductionmentioning
confidence: 99%
“…Domain expert must understand the changes and reconfigure the service description as per the modifications of public policy in view of protecting the e-service consumers [28], for e.g. privacy policy [46]. So information systems need to support internal work within a government's boundaries, service customers through digital interfaces and leverage digital relationships among social partners [38].…”
Section: Introductionmentioning
confidence: 99%
“…Once personal information is disclosed online, it may be abused or accessed without authorization, thus increasing the risk of illegal collection, usage and disclosure of personal sensitive data [3][4][5]. As the issue of privacy exposure is becoming more and more serious, many scholars put forward the concept of privacy-aware service composition which is to limit the propagating scope of consumer's personal privacy information through a strict protective mechanism [8][9][10]. In their opinions, not only the functional requirements, the privacy-aware services also need to satisfy those nonfunctional constraints, such as the privacy constraints.…”
Section: Introductionmentioning
confidence: 99%
“…In our use of privacy policies, the organization has to comply with the users' privacy policies and we require foolproof compliance mechanisms (e.g. [12]) to be in place. Therefore, users are assured that their wishes are respected.…”
Section: Challenging Compliancementioning
confidence: 99%
“…"HWW" stands for hand-held/wearable wireless devices. Finally, there are works targeted at Internet e-services environments dealing with privacy policy derivation [9], privacy policy negotiation [10,11], privacy policy compliance [12], and treating the protection of privacy as a kind of rights management [13].…”
Section: Introductionmentioning
confidence: 99%