- 1.H. Wang, M. K. O. Lee and C. Wang, "Consumer privacy concerns about Internet marketing.", Communications of the ACM, March 1998, 63-70. Google ScholarDigital Library
- 2.B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson and M. Olivier, "Security and Privacy Issues for the World Wide Web: Panel Discussion", Database Security XII: Status and Prospects, Kluwer, To Appear. Google ScholarDigital Library
- 3.L. F. Cranor, "Internet Privacy", Communications of the ACM, February 1999, 29-31. Google ScholarDigital Library
- 4.R. Clarke, "Internet Privacy Concerns Confirm the Case for Intervention.", Communications of the ACM, February 1999, 60-67. Google ScholarDigital Library
- 5.L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall and J. Reagle, "The Platform for Privacy Preferences 1.0", Draft, http://www.w3.org/TR/P3P.Google Scholar
- 6.B. C. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks" IEEE Communications Magazine, Volume 32, Number 9, September 1994, 33-38Google Scholar
- 7.B. C. Neuman and J. Kohl, "The Kerberos Network Authentication Service (V5)" Web Page, http://www.faqs.org/rfcs/rfc1510.html Google ScholarDigital Library
- 8.USC/ISI GOST Group, "The Kerberos Network Authentication Service", Web Page, http://www.isi.edu/gost/gostgroup/products/kerberos/Google Scholar
- 9."SET Home Page", Web Page, http://www.setco.orgGoogle Scholar
- 10."NameSafe Home Page", Web Page, http://www.namesafe.comGoogle Scholar
- 11."iPrivacy Home Page", Web Page, http://www.iprivacy.comGoogle Scholar
- 12.F. Lategan and M. Olivier, "Enforcing Privacy by Withholding Private Information", in S. Qing and J. H. P. Eloff (eds),Information Security for Global Information Infrastructures, Kluwer, August 2000, 421-430. Google ScholarDigital Library
Index Terms
- On granting limited access to private information
Recommendations
Context-Specific Access Control: Conforming Permissions With User Expectations
SPSM '15: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile DevicesCurrent mobile platforms take an all-or-nothing approach to assigning permissions to applications. Once a user grants an application permission to access a particular resource, the application can use that permission whenever it executes thereafter. ...
Privacy-enhanced access control in primelife
DIM '10: Proceedings of the 6th ACM workshop on Digital identity managementThis talk gives an overview of the PrimeLife1 project, funded by the European Commission's 7th Framework Programme, with a particular focus on its research results in privacy-preserving access control in distributed systems. Users commonly reveal more ...
Private data indexes for selective access to outsourced data
WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic societyCloud storage services have recently emerged as a successful approach for making resources conveniently available to large communities of users. Several techniques have been investigated for enabling such services, including encryption for ensuring data ...
Comments