Privacy in the digital age: a review of information privacy research in information systems
F Bélanger, RE Crossler - MIS quarterly, 2011 - JSTOR
Information privacy refers to the desire of individuals to control or have some influence over
data about themselves. Advances in information technology have raised concerns about …
data about themselves. Advances in information technology have raised concerns about …
Personal information exchanging system, personal information providing apparatus, data processing method therefor, and computer program therefor
M Hatakeyama - US Patent App. 13/133,287, 2011 - Google Patents
A personal information providing apparatus 100 includes: a policy storage unit 102 that
stores an approved privacy policy; a policy temporary storage unit 104 that temporarily …
stores an approved privacy policy; a policy temporary storage unit 104 that temporarily …
Modularity is the key a new approach to social media privacy policies
Social media privacy policies are the legal documents which provide inside information
about the collection, storage, and access to user data. These policies are often long and …
about the collection, storage, and access to user data. These policies are often long and …
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms
L Liu, H Zhu, Z Huang - Expert Systems with Applications, 2011 - Elsevier
Web services collaborations are highly automatic, dynamic, heterogeneous, and lack
protection against corruption of processes. These characteristics impose high risks on the …
protection against corruption of processes. These characteristics impose high risks on the …
Towards a base ontology for privacy protection in service-oriented architecture
D Garcia, MBF Toledo, MAM Capretz… - … on Service-Oriented …, 2009 - ieeexplore.ieee.org
The service consumer's confidence in the protection of their privacy is an important factor for
the success of electronic services (e-services). It may increase if the service provider offers a …
the success of electronic services (e-services). It may increase if the service provider offers a …
[PDF][PDF] A simultaneous routing tree construction and fanout optimization algorithm
AH Salek, J Lou, M Pedram - Proceedings of the 1998 IEEE/ACM …, 1998 - dl.acm.org
MSTMCT-This paper presents an optimal algorithm for solving the problem of simultaneous
fanout optimkation and routing tree construction for an ordered set of critical sinks. The …
fanout optimkation and routing tree construction for an ordered set of critical sinks. The …
A web service privacy framework based on a policy approach enhanced with ontologies
DZG Garcia, MBF de Toledo - 2008 11th IEEE International …, 2008 - ieeexplore.ieee.org
The Web service technology facilitates the automated use of electronic services on the Web.
It offers benefits, mainly the system interoperability support, but it also raises privacy …
It offers benefits, mainly the system interoperability support, but it also raises privacy …
Using information flow analysis to detect implicit information leaks for web service composition
J Jiang, Z Huang, W Ma, Y Cao - Frontiers of Information Technology & …, 2018 - Springer
Abstract Information leak, which can undermine the compliance of web-service-composition
business processes for some policies, is one of the major concerns in web service …
business processes for some policies, is one of the major concerns in web service …
[PDF][PDF] Reference architectures for privacy preservation in cloud-based IoT applications
As the promise of the Internet of Things (IoT) materializes in our everyday lives, we are often
challenged with a number of concerns regarding the efficacy of the current data privacy …
challenged with a number of concerns regarding the efficacy of the current data privacy …
Privacy preserving policy framework: User-aware and user-driven
Privacy policies outline and structure data collection and access management for online
services or websites. These policies are often too long, complex, and convoluted for an …
services or websites. These policies are often too long, complex, and convoluted for an …