skip to main content
Skip header Section
Web Privacy with P3pSeptember 2002
Publisher:
  • O'Reilly & Associates, Inc.
  • 103A Morris St. Sebastopol, CA
  • United States
ISBN:978-0-596-00371-5
Published:01 September 2002
Pages:
352
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Filipczuk D, Gerding E and Konstantinidis G (2024). Graph Theory for Consent Management: A New Approach for Complex Data Flows, ACM SIGMOD Record, 53:1, (55-63), Online publication date: 14-May-2024.
  2. Borovits N, Kumara I, Tamburri D and Van Den Heuvel W Privacy Engineering in the Data Mesh: Towards a Decentralized Data Privacy Governance Framework Service-Oriented Computing – ICSOC 2023 Workshops, (265-276)
  3. ACM
    Nouwens M, Liccardi I, Veale M, Karger D and Kagal L Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-13)
  4. ACM
    Jakobi T, Stevens G, Seufert A and Becker M Webtracking under the New Data Protection Law Proceedings of Mensch und Computer 2019, (309-319)
  5. Kapitsaki G and Charalambous T (2019). Adapting HTML5 Web applications to user privacy preferences, World Wide Web, 22:5, (2041-2062), Online publication date: 1-Sep-2019.
  6. Friedland G and Tschantz M Privacy concerns of multimodal sensor systems The Handbook of Multimodal-Multisensor Interfaces, (659-704)
  7. ACM
    Cranor L, Leon P and Ur B (2016). A Large-Scale Evaluation of U.S. Financial Institutions’ Standardized Privacy Notices, ACM Transactions on the Web, 10:3, (1-33), Online publication date: 29-Aug-2016.
  8. ACM
    Ghazinour K and Barker K A privacy preserving model bridging data provider and collector preferences Proceedings of the Joint EDBT/ICDT 2013 Workshops, (174-178)
  9. Xu H, Teo H, Tan B and Agarwal R (2012). Research Note---Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns, Information Systems Research, 23:4, (1342-1363), Online publication date: 1-Dec-2012.
  10. ACM
    Holzer A, Garbinato B and Vessaz F Middleware for location privacy Proceedings of the 2012 ACM Research in Applied Computation Symposium, (296-303)
  11. ACM
    Leon P, Ur B, Shay R, Wang Y, Balebako R and Cranor L Why Johnny can't opt out Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (589-598)
  12. ACM
    Mundie D and Moore A A pattern for trust trap mitigation Proceedings of the 18th Conference on Pattern Languages of Programs, (1-7)
  13. ACM
    Leon P, Cranor L, McDonald A and McGuire R Token attempt Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, (93-104)
  14. ACM
    DeYoung H, Garg D, Jia L, Kaynar D and Datta A Experiences in the logical specification of the HIPAA and GLBA privacy laws Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, (73-82)
  15. Aucher G, Boella G and Van Der Torre L Privacy policies with modal logic Proceedings of the 10th international conference on Deontic logic in computer science, (196-213)
  16. ACM
    Kelley P, Cesca L, Bresee J and Cranor L Standardizing privacy notices Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1573-1582)
  17. Catano N and Rueda C Matelas Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z, (259-272)
  18. Recabarren M and Nussbaum M (2010). Exploring the feasibility of web form adaptation to users' cultural dimension scores, User Modeling and User-Adapted Interaction, 20:1, (87-108), Online publication date: 1-Feb-2010.
  19. Ardagna C, Camenisch J, Kohlweiss M, Leenes R, Neven G, Priem B, Samarati P, Sommer D and Verdicchio M (2010). Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project, Journal of Computer Security, 18:1, (123-160), Online publication date: 1-Jan-2010.
  20. Pearson S and Charlesworth A Accountability as a Way Forward for Privacy Protection in the Cloud Proceedings of the 1st International Conference on Cloud Computing, (131-144)
  21. Creese S, Hopkins P, Pearson S and Shen Y Data Protection-Aware Design for Cloud Services Proceedings of the 1st International Conference on Cloud Computing, (119-130)
  22. ACM
    Trudeau S, Sinclair S and Smith S The effects of introspection on creating privacy policy Proceedings of the 8th ACM workshop on Privacy in the electronic society, (1-10)
  23. Pearson S, Sander T and Sharma R Privacy management for global organizations Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security, (9-17)
  24. ACM
    Goecks J, Edwards W and Mynatt E Challenges in supporting end-user privacy and security management with social navigation Proceedings of the 5th Symposium on Usable Privacy and Security, (1-12)
  25. Pearson S Taking account of privacy when designing cloud computing services Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, (44-52)
  26. ACM
    Egelman S, Tsai J, Cranor L and Acquisti A Timing is everything? Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (319-328)
  27. Löhr H, Sadeghi A, Vishik C and Winandy M Trusted Privacy Domains --- Challenges for Trusted Computing in Privacy-Protecting Information Sharing Proceedings of the 5th International Conference on Information Security Practice and Experience, (396-407)
  28. Poolsappasit N and Ray I (2009). Towards Achieving Personalized Privacy for Location-Based Services, Transactions on Data Privacy, 2:1, (77-99), Online publication date: 1-Apr-2009.
  29. Bodorik P and Jutla D Privacy with Web Serivces Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03, (546-549)
  30. Cranor L, Egelman S, Sheng S, McDonald A and Chowdhury A (2008). P3P deployment on websites, Electronic Commerce Research and Applications, 7:3, (274-293), Online publication date: 1-Nov-2008.
  31. ACM
    Reeder R, Kelley P, McDonald A and Cranor L A user study of the expandable grid applied to P3P privacy policy visualization Proceedings of the 7th ACM workshop on Privacy in the electronic society, (45-54)
  32. Ardagna C, Cremonini M, De Capitani di Vimercati S and Samarati P (2008). A privacy-aware access control system, Journal of Computer Security, 16:4, (369-397), Online publication date: 1-Sep-2008.
  33. ACM
    Ankolekar A and Vrandečić D Kalpana - enabling client-side web personalization Proceedings of the nineteenth ACM conference on Hypertext and hypermedia, (21-26)
  34. Elahi T and Pearson S Privacy assurance Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business, (65-74)
  35. ACM
    Jensen C, Sarkar C, Jensen C and Potts C Tracking website data-collection and privacy practices with the iWatch web crawler Proceedings of the 3rd symposium on Usable privacy and security, (29-40)
  36. Hamadi R, Paik H and Benatallah B Conceptual modeling of privacy-aware web service protocols Proceedings of the 19th international conference on Advanced information systems engineering, (233-248)
  37. ACM
    Jacob V, Krishnan R and Ryu Y (2007). Internet content filtering using isotonic separation on content category ratings, ACM Transactions on Internet Technology, 7:1, (1-es), Online publication date: 1-Feb-2007.
  38. ACM
    Romanosky S, Acquisti A, Hong J, Cranor L and Friedman B Privacy patterns for online interactions Proceedings of the 2006 conference on Pattern languages of programs, (1-9)
  39. Ardagna C, Capitani Di Vimercati S and Samarati P Enhancing User Privacy Through Data Handling Policies 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 4127, (224-236)
  40. ACM
    Brodie C, Karat C and Karat J An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench Proceedings of the second symposium on Usable privacy and security, (8-19)
  41. Choi H, Lee S and Lee H Design and implementation of a policy-based privacy authorization system Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, (129-140)
  42. ACM
    Karat C, Karat J, Brodie C and Feng J Evaluating interfaces for privacy policy rule authoring Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (83-92)
  43. ACM
    Karat C, Brodie C and Karat J (2006). Usable privacy and security for personal information management, Communications of the ACM, 49:1, (56-57), Online publication date: 1-Jan-2006.
  44. Karat J, Karat C, Brodie C and Feng J Designing natural language and structured entry methods for privacy policy authoring Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction, (671-684)
  45. Agrawal R, Kiernan J, Srikant R and Xu Y (2005). XPref, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:5, (809-827), Online publication date: 5-Aug-2005.
  46. ACM
    Brodie C, Karat C, Karat J and Feng J Usable security and privacy Proceedings of the 2005 symposium on Usable privacy and security, (35-43)
  47. Kumaraguru P and Cranor L Privacy in india Proceedings of the 5th international conference on Privacy Enhancing Technologies, (243-258)
  48. ACM
    Levy S and Gutwin C Improving understanding of website privacy policies with fine-grained policy anchors Proceedings of the 14th international conference on World Wide Web, (480-488)
  49. Choi H, Yi Y, Seo J, Noh B and Lee H A privacy protection model in ID management using access control Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (82-91)
  50. ACM
    Barth A and Mitchell J Enterprise privacy promises and enforcement Proceedings of the 2005 workshop on Issues in the theory of security, (58-66)
  51. ACM
    Yu T, Li N and Antón A A formal semantics for P3P Proceedings of the 2004 workshop on Secure web service, (1-8)
  52. Byers S, Cranor L, Kormann D and McDaniel P Searching for privacy Proceedings of the 4th international conference on Privacy Enhancing Technologies, (314-328)
  53. Cranor L 'I didn't buy it for myself' Designing personalized user experiences in eCommerce, (57-73)
  54. Damiani E, De Capitani di Vimercati S and Samarati P (2003). Managing Multiple and Dependable Identities, IEEE Internet Computing, 7:6, (29-37), Online publication date: 1-Nov-2003.
  55. ACM
    Cranor L 'I didn't buy it for myself' privacy and ecommerce personalization Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (111-117)
  56. ACM
    Byers S, Cranor L and Kormann D Automated analysis of P3P-enabled Web sites Proceedings of the 5th international conference on Electronic commerce, (326-338)
  57. ACM
    Agrawal R, Kiernan J, Srikant R and Xu Y An XPath-based preference language for P3P Proceedings of the 12th international conference on World Wide Web, (629-639)
  58. ACM
    Cranor L, Arjula M and Guduru P Use of a P3P user agent by early adopters Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, (1-10)
Contributors
  • Carnegie Mellon University
  • Harvard Law School

Recommendations