Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy

P3P allows Web sites to declare their intentions in a standard form (as a policy) in so far as privacy related matters are concerned. User agents are free to then examine P3P policies prior to engaging in normal interactions with a Web server (upon which the Web site is hosted). Unsuitable policies...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Brandi, Wesley, Olivier, Martin S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 90
container_issue
container_start_page 81
container_title
container_volume
creator Brandi, Wesley
Olivier, Martin S.
description P3P allows Web sites to declare their intentions in a standard form (as a policy) in so far as privacy related matters are concerned. User agents are free to then examine P3P policies prior to engaging in normal interactions with a Web server (upon which the Web site is hosted). Unsuitable policies may result in no further interactions with the Web server. Since P3P was designed with only two parties in mind (the client and the server), the presence of a Web Proxy in the P3P framework raises privacy concerns that demand attention. What is immediately apparent is the problem of a user accessing a site with an acceptable P3P policy via a Proxy which may employ a privacy policy that is unacceptable to the user. In this paper we discuss some of these problems within the context of a P3P environment. In discussing these problems we focus our attention on the identification of a Proxy within a P3P environment and the separation of a Proxy’s policy from the policy of a site being accessed through it.
doi_str_mv 10.1007/11824633_9
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19686666</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19686666</sourcerecordid><originalsourceid>FETCH-LOGICAL-p218t-ea0cc168dd1d819cb520a3cc30775c9414f55d05b42f959327dfad8a03a5f9413</originalsourceid><addsrcrecordid>eNpFkE9Lw0AQxdd_YK29-An2IniJzu7sJtmjSKtCoTlUPIbpZtOuxqRkg7Tf3i1VfJcZ-L03DI-xGwH3AiB7ECKXKkUszQm7Qq0As0xLecpGIhUiQVTmjE1Mlv8xUOdsBAgyMZnCSzYJ4QOiUIKGbMQW093g2sq3a15gwYeOz8j6xg80OF703c67wN833m540QXHKXCKW8wMnhq-3PSOhkOs6P032f01u6ipCW7yO8fsbTZdPr0k88Xz69PjPNlKkQ-JI7BWpHlViSoXxq60BEJrEeLP1iihaq0r0Csla6MNyqyqqcoJkHQdMY7Z7fHuloKlpu6ptT6U295_Ub8vhUnzNCr67o6-EFG7dn256rrPUAooD4WW_4XiD1lbYR0</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy</title><source>Springer Books</source><creator>Brandi, Wesley ; Olivier, Martin S.</creator><contributor>Furnell, Stevel ; Fischer-Hübner, Simone ; Lambrinoudakis, Costas</contributor><creatorcontrib>Brandi, Wesley ; Olivier, Martin S. ; Furnell, Stevel ; Fischer-Hübner, Simone ; Lambrinoudakis, Costas</creatorcontrib><description>P3P allows Web sites to declare their intentions in a standard form (as a policy) in so far as privacy related matters are concerned. User agents are free to then examine P3P policies prior to engaging in normal interactions with a Web server (upon which the Web site is hosted). Unsuitable policies may result in no further interactions with the Web server. Since P3P was designed with only two parties in mind (the client and the server), the presence of a Web Proxy in the P3P framework raises privacy concerns that demand attention. What is immediately apparent is the problem of a user accessing a site with an acceptable P3P policy via a Proxy which may employ a privacy policy that is unacceptable to the user. In this paper we discuss some of these problems within the context of a P3P environment. In discussing these problems we focus our attention on the identification of a Proxy within a P3P environment and the separation of a Proxy’s policy from the policy of a site being accessed through it.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540377504</identifier><identifier>ISBN: 3540377506</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540377522</identifier><identifier>EISBN: 9783540377528</identifier><identifier>DOI: 10.1007/11824633_9</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Information systems. Data bases ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Software</subject><ispartof>Lecture notes in computer science, 2006, p.81-90</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11824633_9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11824633_9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4048,4049,27924,38254,41441,42510</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19686666$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Furnell, Stevel</contributor><contributor>Fischer-Hübner, Simone</contributor><contributor>Lambrinoudakis, Costas</contributor><creatorcontrib>Brandi, Wesley</creatorcontrib><creatorcontrib>Olivier, Martin S.</creatorcontrib><title>Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy</title><title>Lecture notes in computer science</title><description>P3P allows Web sites to declare their intentions in a standard form (as a policy) in so far as privacy related matters are concerned. User agents are free to then examine P3P policies prior to engaging in normal interactions with a Web server (upon which the Web site is hosted). Unsuitable policies may result in no further interactions with the Web server. Since P3P was designed with only two parties in mind (the client and the server), the presence of a Web Proxy in the P3P framework raises privacy concerns that demand attention. What is immediately apparent is the problem of a user accessing a site with an acceptable P3P policy via a Proxy which may employ a privacy policy that is unacceptable to the user. In this paper we discuss some of these problems within the context of a P3P environment. In discussing these problems we focus our attention on the identification of a Proxy within a P3P environment and the separation of a Proxy’s policy from the policy of a site being accessed through it.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Information systems. Data bases</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540377504</isbn><isbn>3540377506</isbn><isbn>3540377522</isbn><isbn>9783540377528</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFkE9Lw0AQxdd_YK29-An2IniJzu7sJtmjSKtCoTlUPIbpZtOuxqRkg7Tf3i1VfJcZ-L03DI-xGwH3AiB7ECKXKkUszQm7Qq0As0xLecpGIhUiQVTmjE1Mlv8xUOdsBAgyMZnCSzYJ4QOiUIKGbMQW093g2sq3a15gwYeOz8j6xg80OF703c67wN833m540QXHKXCKW8wMnhq-3PSOhkOs6P032f01u6ipCW7yO8fsbTZdPr0k88Xz69PjPNlKkQ-JI7BWpHlViSoXxq60BEJrEeLP1iihaq0r0Csla6MNyqyqqcoJkHQdMY7Z7fHuloKlpu6ptT6U295_Ub8vhUnzNCr67o6-EFG7dn256rrPUAooD4WW_4XiD1lbYR0</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Brandi, Wesley</creator><creator>Olivier, Martin S.</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy</title><author>Brandi, Wesley ; Olivier, Martin S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p218t-ea0cc168dd1d819cb520a3cc30775c9414f55d05b42f959327dfad8a03a5f9413</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Information systems. Data bases</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Brandi, Wesley</creatorcontrib><creatorcontrib>Olivier, Martin S.</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Brandi, Wesley</au><au>Olivier, Martin S.</au><au>Furnell, Stevel</au><au>Fischer-Hübner, Simone</au><au>Lambrinoudakis, Costas</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy</atitle><btitle>Lecture notes in computer science</btitle><date>2006</date><risdate>2006</risdate><spage>81</spage><epage>90</epage><pages>81-90</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540377504</isbn><isbn>3540377506</isbn><eisbn>3540377522</eisbn><eisbn>9783540377528</eisbn><abstract>P3P allows Web sites to declare their intentions in a standard form (as a policy) in so far as privacy related matters are concerned. User agents are free to then examine P3P policies prior to engaging in normal interactions with a Web server (upon which the Web site is hosted). Unsuitable policies may result in no further interactions with the Web server. Since P3P was designed with only two parties in mind (the client and the server), the presence of a Web Proxy in the P3P framework raises privacy concerns that demand attention. What is immediately apparent is the problem of a user accessing a site with an acceptable P3P policy via a Proxy which may employ a privacy policy that is unacceptable to the user. In this paper we discuss some of these problems within the context of a P3P environment. In discussing these problems we focus our attention on the identification of a Proxy within a P3P environment and the separation of a Proxy’s policy from the policy of a site being accessed through it.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11824633_9</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2006, p.81-90
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19686666
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Information systems. Data bases
Memory and file management (including protection and security)
Memory organisation. Data processing
Software
title Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T23%3A39%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Extending%20P3P%20to%20Facilitate%20Proxies%20Which%20Pose%20as%20a%20Potential%20Threat%20to%20Privacy&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Brandi,%20Wesley&rft.date=2006&rft.spage=81&rft.epage=90&rft.pages=81-90&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540377504&rft.isbn_list=3540377506&rft_id=info:doi/10.1007/11824633_9&rft_dat=%3Cpascalfrancis_sprin%3E19686666%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540377522&rft.eisbn_list=9783540377528&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true