Abstract
No abstract available.
Cited By
- Filipczuk D, Gerding E and Konstantinidis G (2024). Graph Theory for Consent Management: A New Approach for Complex Data Flows, ACM SIGMOD Record, 53:1, (55-63), Online publication date: 14-May-2024.
- Borovits N, Kumara I, Tamburri D and Van Den Heuvel W Privacy Engineering in the Data Mesh: Towards a Decentralized Data Privacy Governance Framework Service-Oriented Computing – ICSOC 2023 Workshops, (265-276)
- Nouwens M, Liccardi I, Veale M, Karger D and Kagal L Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-13)
- Jakobi T, Stevens G, Seufert A and Becker M Webtracking under the New Data Protection Law Proceedings of Mensch und Computer 2019, (309-319)
- Kapitsaki G and Charalambous T (2019). Adapting HTML5 Web applications to user privacy preferences, World Wide Web, 22:5, (2041-2062), Online publication date: 1-Sep-2019.
- Friedland G and Tschantz M Privacy concerns of multimodal sensor systems The Handbook of Multimodal-Multisensor Interfaces, (659-704)
- Cranor L, Leon P and Ur B (2016). A Large-Scale Evaluation of U.S. Financial Institutions’ Standardized Privacy Notices, ACM Transactions on the Web, 10:3, (1-33), Online publication date: 29-Aug-2016.
- Ghazinour K and Barker K A privacy preserving model bridging data provider and collector preferences Proceedings of the Joint EDBT/ICDT 2013 Workshops, (174-178)
- Xu H, Teo H, Tan B and Agarwal R (2012). Research Note---Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns, Information Systems Research, 23:4, (1342-1363), Online publication date: 1-Dec-2012.
- Holzer A, Garbinato B and Vessaz F Middleware for location privacy Proceedings of the 2012 ACM Research in Applied Computation Symposium, (296-303)
- Leon P, Ur B, Shay R, Wang Y, Balebako R and Cranor L Why Johnny can't opt out Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (589-598)
- Mundie D and Moore A A pattern for trust trap mitigation Proceedings of the 18th Conference on Pattern Languages of Programs, (1-7)
- Leon P, Cranor L, McDonald A and McGuire R Token attempt Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, (93-104)
- DeYoung H, Garg D, Jia L, Kaynar D and Datta A Experiences in the logical specification of the HIPAA and GLBA privacy laws Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, (73-82)
- Aucher G, Boella G and Van Der Torre L Privacy policies with modal logic Proceedings of the 10th international conference on Deontic logic in computer science, (196-213)
- Kelley P, Cesca L, Bresee J and Cranor L Standardizing privacy notices Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1573-1582)
- Catano N and Rueda C Matelas Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z, (259-272)
- Recabarren M and Nussbaum M (2010). Exploring the feasibility of web form adaptation to users' cultural dimension scores, User Modeling and User-Adapted Interaction, 20:1, (87-108), Online publication date: 1-Feb-2010.
- Ardagna C, Camenisch J, Kohlweiss M, Leenes R, Neven G, Priem B, Samarati P, Sommer D and Verdicchio M (2010). Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project, Journal of Computer Security, 18:1, (123-160), Online publication date: 1-Jan-2010.
- Pearson S and Charlesworth A Accountability as a Way Forward for Privacy Protection in the Cloud Proceedings of the 1st International Conference on Cloud Computing, (131-144)
- Creese S, Hopkins P, Pearson S and Shen Y Data Protection-Aware Design for Cloud Services Proceedings of the 1st International Conference on Cloud Computing, (119-130)
- Trudeau S, Sinclair S and Smith S The effects of introspection on creating privacy policy Proceedings of the 8th ACM workshop on Privacy in the electronic society, (1-10)
- Pearson S, Sander T and Sharma R Privacy management for global organizations Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security, (9-17)
- Goecks J, Edwards W and Mynatt E Challenges in supporting end-user privacy and security management with social navigation Proceedings of the 5th Symposium on Usable Privacy and Security, (1-12)
- Pearson S Taking account of privacy when designing cloud computing services Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, (44-52)
- Egelman S, Tsai J, Cranor L and Acquisti A Timing is everything? Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (319-328)
- Löhr H, Sadeghi A, Vishik C and Winandy M Trusted Privacy Domains --- Challenges for Trusted Computing in Privacy-Protecting Information Sharing Proceedings of the 5th International Conference on Information Security Practice and Experience, (396-407)
- Poolsappasit N and Ray I (2009). Towards Achieving Personalized Privacy for Location-Based Services, Transactions on Data Privacy, 2:1, (77-99), Online publication date: 1-Apr-2009.
- Bodorik P and Jutla D Privacy with Web Serivces Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (546-549)
- Cranor L, Egelman S, Sheng S, McDonald A and Chowdhury A (2008). P3P deployment on websites, Electronic Commerce Research and Applications, 7:3, (274-293), Online publication date: 1-Nov-2008.
- Reeder R, Kelley P, McDonald A and Cranor L A user study of the expandable grid applied to P3P privacy policy visualization Proceedings of the 7th ACM workshop on Privacy in the electronic society, (45-54)
- Ardagna C, Cremonini M, De Capitani di Vimercati S and Samarati P (2008). A privacy-aware access control system, Journal of Computer Security, 16:4, (369-397), Online publication date: 1-Sep-2008.
- Ankolekar A and Vrandečić D Kalpana - enabling client-side web personalization Proceedings of the nineteenth ACM conference on Hypertext and hypermedia, (21-26)
- Elahi T and Pearson S Privacy assurance Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business, (65-74)
- Jensen C, Sarkar C, Jensen C and Potts C Tracking website data-collection and privacy practices with the iWatch web crawler Proceedings of the 3rd symposium on Usable privacy and security, (29-40)
- Hamadi R, Paik H and Benatallah B Conceptual modeling of privacy-aware web service protocols Proceedings of the 19th international conference on Advanced information systems engineering, (233-248)
- Jacob V, Krishnan R and Ryu Y (2007). Internet content filtering using isotonic separation on content category ratings, ACM Transactions on Internet Technology, 7:1, (1-es), Online publication date: 1-Feb-2007.
- Romanosky S, Acquisti A, Hong J, Cranor L and Friedman B Privacy patterns for online interactions Proceedings of the 2006 conference on Pattern languages of programs, (1-9)
- Ardagna C, Capitani Di Vimercati S and Samarati P Enhancing User Privacy Through Data Handling Policies 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 4127, (224-236)
- Brodie C, Karat C and Karat J An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench Proceedings of the second symposium on Usable privacy and security, (8-19)
- Choi H, Lee S and Lee H Design and implementation of a policy-based privacy authorization system Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, (129-140)
- Karat C, Karat J, Brodie C and Feng J Evaluating interfaces for privacy policy rule authoring Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (83-92)
- Karat C, Brodie C and Karat J (2006). Usable privacy and security for personal information management, Communications of the ACM, 49:1, (56-57), Online publication date: 1-Jan-2006.
- Karat J, Karat C, Brodie C and Feng J Designing natural language and structured entry methods for privacy policy authoring Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction, (671-684)
- Agrawal R, Kiernan J, Srikant R and Xu Y (2005). XPref, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:5, (809-827), Online publication date: 5-Aug-2005.
- Brodie C, Karat C, Karat J and Feng J Usable security and privacy Proceedings of the 2005 symposium on Usable privacy and security, (35-43)
- Kumaraguru P and Cranor L Privacy in india Proceedings of the 5th international conference on Privacy Enhancing Technologies, (243-258)
- Levy S and Gutwin C Improving understanding of website privacy policies with fine-grained policy anchors Proceedings of the 14th international conference on World Wide Web, (480-488)
- Choi H, Yi Y, Seo J, Noh B and Lee H A privacy protection model in ID management using access control Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (82-91)
- Barth A and Mitchell J Enterprise privacy promises and enforcement Proceedings of the 2005 workshop on Issues in the theory of security, (58-66)
- Yu T, Li N and Antón A A formal semantics for P3P Proceedings of the 2004 workshop on Secure web service, (1-8)
- Byers S, Cranor L, Kormann D and McDaniel P Searching for privacy Proceedings of the 4th international conference on Privacy Enhancing Technologies, (314-328)
- Cranor L 'I didn't buy it for myself' Designing personalized user experiences in eCommerce, (57-73)
- Damiani E, De Capitani di Vimercati S and Samarati P (2003). Managing Multiple and Dependable Identities, IEEE Internet Computing, 7:6, (29-37), Online publication date: 1-Nov-2003.
- Cranor L 'I didn't buy it for myself' privacy and ecommerce personalization Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (111-117)
- Byers S, Cranor L and Kormann D Automated analysis of P3P-enabled Web sites Proceedings of the 5th international conference on Electronic commerce, (326-338)
- Agrawal R, Kiernan J, Srikant R and Xu Y An XPath-based preference language for P3P Proceedings of the 12th international conference on World Wide Web, (629-639)
- Cranor L, Arjula M and Guduru P Use of a P3P user agent by early adopters Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, (1-10)
Recommendations
P3P privacy enhancing agent
SWS '06: Proceedings of the 3rd ACM workshop on Secure web servicesProtecting personal privacy information is an inherently difficult problem. Privacy enhancing agents are software agents that help web users to protect their private information by collecting web site P3P [1] information and exchanging knowledge of web ...
E-P3P privacy policies and privacy authorization
WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic SocietyEnterprises collect large amounts of personal data from their customers. To ease privacy concerns, enterprises publish privacy statements that outline how data is used and shared. The Platform for Enterprise Privacy Practices (E-P3P) defines a fine-...