Results 321 to 330 of about 4,362,198 (352)
Some of the next articles are maybe not open access.
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation
IWSPA@CODASPY, 2018Nowadays Internet services have dramatically changed the way people interact with each other and many of our daily activities are supported by those services.
W. Tesfay+4 more
semanticscholar +1 more source
Prioritized Execution of Privacy Policies
2013This paper addresses the issue of solving conflicts occurring in the authorization decision process among policies applicable to an access request. We propose a strategy for conflict resolution based on the evaluation of the specificity level of the elements constituting the policies.
Ilaria Matteucci+2 more
openaire +3 more sources
Security, Privacy, and Policy Roundup
IEEE Security & Privacy, 2012■ Scientists from the ca’ Foscari University of Venice, the University of Birmingham, Google, and the Norwegian University of Science and Technology designed a cyberattack that took only 13 minutes to steal the keys from RSA’s SecurID 800 token fob. They say their exploit could also compromise additional devices that store RSA keys, including other ...
openaire +3 more sources
Analyzing GDPR Compliance Through the Lens of Privacy Policy
Poly/DMAH@VLDB, 2019With the arrival of the European Union's General Data Protection Regulation (GDPR), several companies are making significant changes to their systems to achieve compliance.
Jayashree Mohan+2 more
semanticscholar +1 more source
The IEEE symposium on Computers and Communications, 2010
Security policies exchanged between applications are typically huge, complex and private. A server must publish these policies to permit any client that wants to use the service to match it with its own preferences and assess whether it complies with its security policy.
Trabelsi S.+4 more
openaire +2 more sources
Security policies exchanged between applications are typically huge, complex and private. A server must publish these policies to permit any client that wants to use the service to match it with its own preferences and assess whether it complies with its security policy.
Trabelsi S.+4 more
openaire +2 more sources
A Survey on Privacy Policy Languages: Expressiveness Concerning Data Protection Regulations
IEEE International Conference on Control, Measurement and Instrumentation, 2019Privacy policies are a widely used way of expressing the data handling by service providers. However, the legalese used in these documents hinders many users in understanding the important information about what is happening with their data.
Jens Leicht, M. Heisel
semanticscholar +1 more source
2007 IEEE 23rd International Conference on Data Engineering Workshop, 2007
Almost all company Web sites collect some information about the user in some form. The information may be a simple IP address of the host to extensive personal information about the user. It is now a well established procedure for a company to state its privacy policy on their website, due to the prevalent laws of the land or just to establish their ...
Farshad Fotouhi+2 more
openaire +1 more source
Almost all company Web sites collect some information about the user in some form. The information may be a simple IP address of the host to extensive personal information about the user. It is now a well established procedure for a company to state its privacy policy on their website, due to the prevalent laws of the land or just to establish their ...
Farshad Fotouhi+2 more
openaire +1 more source
A workbench for privacy policies
Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241), 2002This paper describes a tool that may be used to create and analyse privacy policies based on the InfoPriv model (proposed by us elsewhere). It is called the Privacy Workbench and consists of four modules: the Privacy Policy, Graph Module, Inference Engine and Rule Base.
Martin S. Olivier, Lucas C. J. Dreyer
openaire +2 more sources
Effects of privacy policy visualization on users' information privacy awareness level
Information Technology and People, 2019Purpose The purpose of this paper is to propose visualization techniques as a new representation for privacy policies instead of traditional textual representation and to examine empirically their effects on users’ information privacy awareness level.
Aikaterini Soumelidou, A. Tsohou
semanticscholar +1 more source
ACM SIGCAS Computers and Society, 1976
The following article is excerpted from testimony presented by Dr. Brandin, Gene P. Altshuler, Peter D. Miller, and Donn B. Parker before the Privacy Protection Study Commission, September 8, 1975 on behalf of Stanford Research Institute. Since the testimony comments on privacy as an issue for public it is included in this issue of <u>Computers ...
openaire +2 more sources
The following article is excerpted from testimony presented by Dr. Brandin, Gene P. Altshuler, Peter D. Miller, and Donn B. Parker before the Privacy Protection Study Commission, September 8, 1975 on behalf of Stanford Research Institute. Since the testimony comments on privacy as an issue for public it is included in this issue of <u>Computers ...
openaire +2 more sources