Abstract — Concerns of users about the privacy of their data are becoming more important to providers of online services, as they develop into a major barrier for broad acceptance of applications, that gather data about their users. With P3P there exists a standard that, in the context of web-based applications, gives users some control over the gathering, use and relaying of their data. However, P3P still lacks a negotiation mechanism. This article outlines basic mechanisms that can be used to implement a privacy negotiation protocol. Our ideas extend the expressiveness of the P3P languages and provide means to improve their negotiation strategy to service users as well as to service providers. We also discuss open issues such as how to ma...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...
Web Services is a new direction for businesses to extend the scope of their business applications ou...
International audienceConcerns of users about privacy of their personal data are of higher and highe...
This paper examines how negotiation techniques can resolve the trade-off between service providers ’...
Abstract. This paper examines how service providers may resolve the trade-off between their personal...
Privacy policy languages, such as P3P, allow websites to publish their privacy practices and policie...
This paper examines how service providers may re-solve the trade-off between their personalization e...
Trust negotiation is a promising approach for establishing trust in open systems, where sensitive in...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Web services among of the applications involving closely the customer’s private information. In orde...
In recent Web services research, there are increasing demands and discussions about negotiation tech...
With the development of web services technology, web services have changed from single to composite ...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...
Web Services is a new direction for businesses to extend the scope of their business applications ou...
International audienceConcerns of users about privacy of their personal data are of higher and highe...
This paper examines how negotiation techniques can resolve the trade-off between service providers ’...
Abstract. This paper examines how service providers may resolve the trade-off between their personal...
Privacy policy languages, such as P3P, allow websites to publish their privacy practices and policie...
This paper examines how service providers may re-solve the trade-off between their personalization e...
Trust negotiation is a promising approach for establishing trust in open systems, where sensitive in...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Web services among of the applications involving closely the customer’s private information. In orde...
In recent Web services research, there are increasing demands and discussions about negotiation tech...
With the development of web services technology, web services have changed from single to composite ...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...
Many service providers require permissions to access privacy-sensitive data that are not necessary f...