TY - GEN
T1 - Obligations
T2 - 5th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2008
AU - Alcalde Bagüés, Susana
AU - Mitic, Jelena
AU - Zeidler, Andreas
AU - Tejada, Marta
AU - Matias, Ignacio R.
AU - Fernandez Valdivielso, Carlos
PY - 2008
Y1 - 2008
N2 - In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Today's laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.
AB - In this paper we present a novel architecture for extending the traditional notion of access control to privacy-related data toward a holistic privacy management system. The key elements used are obligations. They constitute a means for controlling the use of private data even after the data was disclosed to some third-party. Today's laws mostly are regulating the conduct of business between an individual and some enterprise. They mainly focus on long-lived and static relationships between a user and a service provider. However, due to the dynamic nature of pervasive computing environments, rather more sophisticated mechanisms than a simple offer/accept-based privacy negotiation are required. Thus, we introduce a privacy architecture which allows a user not only to negotiate the level of privacy needed in a rather automated way but also to track and monitor the whole life-cycle of data once it has been disclosed.
UR - https://www.scopus.com/pages/publications/52149100729
U2 - 10.1007/978-3-540-85735-8_17
DO - 10.1007/978-3-540-85735-8_17
M3 - Conference contribution
AN - SCOPUS:52149100729
SN - 3540857346
SN - 9783540857341
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 173
EP - 184
BT - Trust, Privacy and Security in Digital Business - 5th International Conference, TrustBus 2008, Proceedings
Y2 - 4 September 2008 through 5 September 2008
ER -