We propose publishing L2TAP privacy logs to facilitate pri-vacy auditing tasks that involve multiple auditors, an increas-ingly common requirement in the context of social computing and big data driven science. Our proposal utilizes two on-tologies, L2TAP and SCIP, designed for deployment in a Linked Data environment. L2TAP provides provenance en-abled logging of events. SCIP synthesizes contextual integrity concepts to express key privacy-related semantics associated with log events. We describe SPARQL query-based solu-tions for privacy log construction, obligation derivation, and compliance checking. The solutions facilitate accountability and transparency among participants (privacy auditors in particular). 1
Cloud computing is situating its position in the market as the next disruptive utility paradigm base...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
As individuals are increasingly benefiting from the use of online services, there are growing concer...
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for tr...
In the online world, increasing amounts of personal data of users are processed by service providers...
Abstract. Accountability is increasingly recognised as a cornerstone of data protection, notably in ...
Event logs capture the execution of business processes in terms of executed activities and their exe...
On the Internet today, users are accustomed to disclosing personal information when accessing a new ...
We propose an abstract model of business processes for the purpose of (i) evaluating privacy policy ...
© Springer International Publishing Switzerland 2016. Service providers collect and process more use...
In this paper we present a scheme for building a logging-trail for processes related to eGovernment ...
While logging events is becoming increasingly common in computing, in communication and in collabora...
Cloud computing is emerging as the next disruptive utility paradigm [1]. It provides extensive stora...
Cloud computing is reserving its position in the market as the next disruptive utility paradigm. It ...
Cloud computing is situating its position in the market as the next disruptive utility paradigm base...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
As individuals are increasingly benefiting from the use of online services, there are growing concer...
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for tr...
In the online world, increasing amounts of personal data of users are processed by service providers...
Abstract. Accountability is increasingly recognised as a cornerstone of data protection, notably in ...
Event logs capture the execution of business processes in terms of executed activities and their exe...
On the Internet today, users are accustomed to disclosing personal information when accessing a new ...
We propose an abstract model of business processes for the purpose of (i) evaluating privacy policy ...
© Springer International Publishing Switzerland 2016. Service providers collect and process more use...
In this paper we present a scheme for building a logging-trail for processes related to eGovernment ...
While logging events is becoming increasingly common in computing, in communication and in collabora...
Cloud computing is emerging as the next disruptive utility paradigm [1]. It provides extensive stora...
Cloud computing is reserving its position in the market as the next disruptive utility paradigm. It ...
Cloud computing is situating its position in the market as the next disruptive utility paradigm base...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...