Handling Privacy Obligations and Constraints to Underpin Trust and Assurance

نویسندگان

  • Marco Casassa Mont
  • Stephen Crane
  • Siani Pearson
چکیده

Trust is important to enable interactions on the web, in particular with enterprises. The trust that people have in enterprises can be built, reinforced or modified via a variety of means and tools, including personal experience, analysis of prior history, recommendations, certification and auditing by known authorities. The behaviour of an enterprise and the fact that it performs as predicted and agreed is important to shape its reputation and perception of trustworthiness. In particular, the way enterprises handle privacy has an impact on these aspects. We focus on enterprises that recognise the importance of dealing properly with privacy to increase their reputation and business opportunities. Important problems need to be addressed: how can enterprises provide people with degrees of assurance that they will operate in the way dictated by policies and privacy obligations, according to people’s expectations? How can enterprises explicitly manage these policies? How can people check upfront that an enterprise has the right capabilities to handle and process their personal data? How can people have a constant, personalized feedback on the fulfillment of all these aspects? We describe requirements, a model to address the problem and provide technical details. Our work is in progress: initial prototypes have been developed and further work will be done in the context of the EU PRIME123 project.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Obligations for Privacy and Confidentiality in Distributed Transactions

Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no negotiation between the client and the service provider. As access management systems lean towards being user-centric, unilateral approaches can no longer adequately preserve the user’s privacy, particularly where the ...

متن کامل

Obligations of trust for privacy and confidentiality in distributed transactions

Purpose – This paper describes a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. We introduce the concept of the Obligation of Trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and au...

متن کامل

Dealing with Privacy Obligations in Enterprises

This paper focuses on the problem of dealing with privacy obligations in enterprises. Privacy obligations dictate expected behaviours, tasks and constraints that must be satisfied when handling personal and confidential data. This includes being compliant with data retention policies and satisfying constraints dictated by customers’ opt-in and opt-out choices. It is important for enterprises to...

متن کامل

Efficacy of Privacy Assurance Mechanisms in the Context of Disclosing Health Information Online

Privacy policy statements and privacy-assurance cues are among the most important website features that online providers could use to alleviate web customers’ privacy concerns. This study examines the moderating role of privacy concern on how privacy assurance cues and argument quality contribute to increased trust, and the subsequent decision to disclose health information online. This study h...

متن کامل

Obligation Language for Access Control and Privacy Policies

Defining and enforcing obligations are key aspects of privacy protection. Most of today’s access control and data handling languages recognize the importance of obligations and even provide extension points but lack concrete language constructs to actually express obligations. This position paper proposes requirements for a general obligation language spanning access control and usage control. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005