A Proxy for Privacy: the Discreet Box
The issue of user privacy is constantly brought to the spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provision. Although technology makes the collection of data easy, their protection agains...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 973 |
---|---|
container_issue | |
container_start_page | 966 |
container_title | |
container_volume | |
creator | Lioudakis, G.V. Koutsoloukas, E.A. Dellas, N. Kapellaki, S. Prezerakos, G.N. Kaklamani, D.I. Venieris, I.S. |
description | The issue of user privacy is constantly brought to the spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provision. Although technology makes the collection of data easy, their protection against abuse is left to data protection legislation. However, the privacy requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down in the technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and avoid the misuse of personal data, this paper discusses an architectural proposal for a middleware system that will enforce protection of user privacy through technical means. This goal is facilitated by a combination of a policy framework, a sensible interpretation of regulations into policies and the introduction of a privacy broker, named the discreet box. |
doi_str_mv | 10.1109/EURCON.2007.4400521 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4400521</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4400521</ieee_id><sourcerecordid>4400521</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-a22dba01670cda1c960881aac4ec909bc90f8e4f25eb2940673cc8b2eb4f3d883</originalsourceid><addsrcrecordid>eNo1j01LxDAURSMiqGN_wWyycdn6XpJpEndjHT9gcERGcDck6QtGlEpaZPrvLThu7rlnc-EyNkeoEMFerV5fms1TJQB0pRTAQuARO0clJjEo345ZYbX5dyFOWdH3HwCAupbW6jN2ueTPuduPPHZ5aunHhfGaD-_Eb1MfMtHAb7r9BTuJ7rOn4sAZ296tts1Dud7cPzbLdZksDKUTovUOsNYQWofB1mAMOhcUBQvWTxENqSgW5IVVUGsZgvGCvIqyNUbO2PxvNhHR7junL5fH3eGY_AX2CEBG</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Proxy for Privacy: the Discreet Box</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Lioudakis, G.V. ; Koutsoloukas, E.A. ; Dellas, N. ; Kapellaki, S. ; Prezerakos, G.N. ; Kaklamani, D.I. ; Venieris, I.S.</creator><creatorcontrib>Lioudakis, G.V. ; Koutsoloukas, E.A. ; Dellas, N. ; Kapellaki, S. ; Prezerakos, G.N. ; Kaklamani, D.I. ; Venieris, I.S.</creatorcontrib><description>The issue of user privacy is constantly brought to the spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provision. Although technology makes the collection of data easy, their protection against abuse is left to data protection legislation. However, the privacy requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down in the technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and avoid the misuse of personal data, this paper discusses an architectural proposal for a middleware system that will enforce protection of user privacy through technical means. This goal is facilitated by a combination of a policy framework, a sensible interpretation of regulations into policies and the introduction of a privacy broker, named the discreet box.</description><identifier>ISBN: 9781424408122</identifier><identifier>ISBN: 1424408121</identifier><identifier>EISBN: 142440813X</identifier><identifier>EISBN: 9781424408139</identifier><identifier>DOI: 10.1109/EURCON.2007.4400521</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Context-aware services ; Data privacy ; Data security ; Information security ; Law ; Legal factors ; Legislation ; Monitoring ; Ontologies ; Privacy ; Privacy Legislation ; Privacy Middleware ; Protection</subject><ispartof>EUROCON 2007 - The International Conference on "Computer as a Tool", 2007, p.966-973</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4400521$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4400521$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lioudakis, G.V.</creatorcontrib><creatorcontrib>Koutsoloukas, E.A.</creatorcontrib><creatorcontrib>Dellas, N.</creatorcontrib><creatorcontrib>Kapellaki, S.</creatorcontrib><creatorcontrib>Prezerakos, G.N.</creatorcontrib><creatorcontrib>Kaklamani, D.I.</creatorcontrib><creatorcontrib>Venieris, I.S.</creatorcontrib><title>A Proxy for Privacy: the Discreet Box</title><title>EUROCON 2007 - The International Conference on "Computer as a Tool"</title><addtitle>EURCON</addtitle><description>The issue of user privacy is constantly brought to the spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provision. Although technology makes the collection of data easy, their protection against abuse is left to data protection legislation. However, the privacy requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down in the technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and avoid the misuse of personal data, this paper discusses an architectural proposal for a middleware system that will enforce protection of user privacy through technical means. This goal is facilitated by a combination of a policy framework, a sensible interpretation of regulations into policies and the introduction of a privacy broker, named the discreet box.</description><subject>Access control</subject><subject>Context-aware services</subject><subject>Data privacy</subject><subject>Data security</subject><subject>Information security</subject><subject>Law</subject><subject>Legal factors</subject><subject>Legislation</subject><subject>Monitoring</subject><subject>Ontologies</subject><subject>Privacy</subject><subject>Privacy Legislation</subject><subject>Privacy Middleware</subject><subject>Protection</subject><isbn>9781424408122</isbn><isbn>1424408121</isbn><isbn>142440813X</isbn><isbn>9781424408139</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1j01LxDAURSMiqGN_wWyycdn6XpJpEndjHT9gcERGcDck6QtGlEpaZPrvLThu7rlnc-EyNkeoEMFerV5fms1TJQB0pRTAQuARO0clJjEo345ZYbX5dyFOWdH3HwCAupbW6jN2ueTPuduPPHZ5aunHhfGaD-_Eb1MfMtHAb7r9BTuJ7rOn4sAZ296tts1Dud7cPzbLdZksDKUTovUOsNYQWofB1mAMOhcUBQvWTxENqSgW5IVVUGsZgvGCvIqyNUbO2PxvNhHR7junL5fH3eGY_AX2CEBG</recordid><startdate>200709</startdate><enddate>200709</enddate><creator>Lioudakis, G.V.</creator><creator>Koutsoloukas, E.A.</creator><creator>Dellas, N.</creator><creator>Kapellaki, S.</creator><creator>Prezerakos, G.N.</creator><creator>Kaklamani, D.I.</creator><creator>Venieris, I.S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200709</creationdate><title>A Proxy for Privacy: the Discreet Box</title><author>Lioudakis, G.V. ; Koutsoloukas, E.A. ; Dellas, N. ; Kapellaki, S. ; Prezerakos, G.N. ; Kaklamani, D.I. ; Venieris, I.S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-a22dba01670cda1c960881aac4ec909bc90f8e4f25eb2940673cc8b2eb4f3d883</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Access control</topic><topic>Context-aware services</topic><topic>Data privacy</topic><topic>Data security</topic><topic>Information security</topic><topic>Law</topic><topic>Legal factors</topic><topic>Legislation</topic><topic>Monitoring</topic><topic>Ontologies</topic><topic>Privacy</topic><topic>Privacy Legislation</topic><topic>Privacy Middleware</topic><topic>Protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Lioudakis, G.V.</creatorcontrib><creatorcontrib>Koutsoloukas, E.A.</creatorcontrib><creatorcontrib>Dellas, N.</creatorcontrib><creatorcontrib>Kapellaki, S.</creatorcontrib><creatorcontrib>Prezerakos, G.N.</creatorcontrib><creatorcontrib>Kaklamani, D.I.</creatorcontrib><creatorcontrib>Venieris, I.S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lioudakis, G.V.</au><au>Koutsoloukas, E.A.</au><au>Dellas, N.</au><au>Kapellaki, S.</au><au>Prezerakos, G.N.</au><au>Kaklamani, D.I.</au><au>Venieris, I.S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Proxy for Privacy: the Discreet Box</atitle><btitle>EUROCON 2007 - The International Conference on "Computer as a Tool"</btitle><stitle>EURCON</stitle><date>2007-09</date><risdate>2007</risdate><spage>966</spage><epage>973</epage><pages>966-973</pages><isbn>9781424408122</isbn><isbn>1424408121</isbn><eisbn>142440813X</eisbn><eisbn>9781424408139</eisbn><abstract>The issue of user privacy is constantly brought to the spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provision. Although technology makes the collection of data easy, their protection against abuse is left to data protection legislation. However, the privacy requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down in the technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and avoid the misuse of personal data, this paper discusses an architectural proposal for a middleware system that will enforce protection of user privacy through technical means. This goal is facilitated by a combination of a policy framework, a sensible interpretation of regulations into policies and the introduction of a privacy broker, named the discreet box.</abstract><pub>IEEE</pub><doi>10.1109/EURCON.2007.4400521</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424408122 |
ispartof | EUROCON 2007 - The International Conference on "Computer as a Tool", 2007, p.966-973 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4400521 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Context-aware services Data privacy Data security Information security Law Legal factors Legislation Monitoring Ontologies Privacy Privacy Legislation Privacy Middleware Protection |
title | A Proxy for Privacy: the Discreet Box |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T22%3A40%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Proxy%20for%20Privacy:%20the%20Discreet%20Box&rft.btitle=EUROCON%202007%20-%20The%20International%20Conference%20on%20%22Computer%20as%20a%20Tool%22&rft.au=Lioudakis,%20G.V.&rft.date=2007-09&rft.spage=966&rft.epage=973&rft.pages=966-973&rft.isbn=9781424408122&rft.isbn_list=1424408121&rft_id=info:doi/10.1109/EURCON.2007.4400521&rft_dat=%3Cieee_6IE%3E4400521%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=142440813X&rft.eisbn_list=9781424408139&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4400521&rfr_iscdi=true |