Privacy support and evaluation on an ontological basis
Access Status
Authors
Date
2007Type
Metadata
Show full item recordCitation
Source Title
Source Conference
ISBN
Faculty
School
Remarks
Copyright © 2007 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Collection
Abstract
This work is concerned with user perceived privacy and how clients (which we call data subjects here) can be empowered to control their own data consistently with their own interests. To support building and evaluation of privacy-aware applications, we describe a privacy ontology, how the privacy principles relate to that and how they are influenced by the core concepts as well as by each other. We use this influence of the privacy principles to evaluate the level of privacy for a particular transaction, when applying and extending the core concepts for an application domain.
Related items
Showing items related by title, author, creator and subject.
-
Skinner, Geoffrey; Han, Song; Chang, Elizabeth (2006)With the increasing number of proposals and approaches to privacy protection, it has become very difficult to build information systems that provide comprehensive protection for a very broad range of information privacy ...
-
Wu, Chen; Potdar, Vidyasagar; Chang, Elizabeth (2006)Research into privacy in web services based service-oriented environment gained attention in recent years. Business Transaction Level Data (TLD) privacy is important because in web services the interaction between the ...
-
Skinner, Geoffrey; Chang, Elizabeth (2006)There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. ...