Expressing Privacy Preferences
نویسندگان
چکیده
This document defines a framework for authorization policies controlling access to application-specific data. This framework combines common locationand presence-specific authorization aspects. An XML schema specifies the language in which common policy rules are represented. The common policy framework can be extended to other application domains. Schulzrinne, et al. Standards Track [Page 1] RFC 4745 Common Policy February 2007 Table of
منابع مشابه
Expressing Privacy Preferences in terms of Invasiveness
Dynamic context aware systems need highly flexible privacy protection mechanisms. We describe an extension to an existing RBAC-based mechanism that utilises a dynamic measure of invasiveness to determine whether contextual information should be released.
متن کاملSensitivity Level-Based Citizen Personal Information Model for Privacy Protection
Citizens’ privacy concerns have become a major barrier to their acceptance of e-government services, and the question of how to address these privacy issues effectively is increasingly important as government pushes service delivery online. Good protection of citizens’ privacy will contribute significantly to the success of e-government services. Therefore, it is highly desirable to take into a...
متن کاملTowards Achieving Personalized Privacy for Location-Based Services
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBSs). Although LBSs provide enhanced functionalities, they open up new vulnerabilities that can be exploited to cause security and privacy breaches. Consequently, location data of individuals used by such services must be adequately protected. Such services will require newmodels for ...
متن کاملRunning head: Policies for Web Security Services Policies for Web Security Services
This chapter analyzes the various types of policies implemented by the web security services. According to X.800 definition five are the basic web security services categories: authentication, non-repudiation, access control, data integrity and data confidentiality. In this chapter we discuss access control and data privacy services. Access control services may adopt various models according to...
متن کاملExploring Nursing Students’ Experiences of Privacy in Pediatrics Ward: A Qualitative Study
Background and Objectives: Respecting privacy means respecting individuals, their dignity and independence. It is mandatory to observe privacy in health-care systems. Therefore, this study was carried out with the aim of expressing nursing students’ experience of privacy in pediatrics ward. Methods: This qualitative study was done inductively using content analysis method. The participant...
متن کاملOn Content-Based Recommendation and User Privacy in Social-Tagging Systems
Recommendation systems and content filtering approaches based on annotations and ratings, essentially rely on users expressing their preferences and interests through their actions, in order to provide personalised content. This activity, in which users engage collectively has been named social tagging, and it is one of the most popular in which users engage online, and although it has opened n...
متن کامل