Abstract
This talk has two parts:
1. Report on adding Individual Privacy Policies to NSN’s Research Prototype for IDM
2. Challenge for Research in Access/Usage Control:
“How to control in Web 2.0 the flow of PII bypassing today’s IDM”
BibTeX - Entry
@InProceedings{marhoefer_et_al:DagSemProc.10141.3,
author = {Marhoefer, Michael and Seidl, Robert},
title = {{Enforcement of Individual Privacy Policies by Communication Service Providers}},
booktitle = {Distributed Usage Control},
pages = {1--4},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2010},
volume = {10141},
editor = {Sandro Etalle and Alexander Pretschner and Raiv S. Sandhu and Marianne Winslett},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2010/2715},
URN = {urn:nbn:de:0030-drops-27151},
doi = {10.4230/DagSemProc.10141.3},
annote = {Keywords: Privacy identity IdP browser online-privacy Web 2.0 Communication Service Provider}
}
Keywords: |
|
Privacy identity IdP browser online-privacy Web 2.0 Communication Service Provider |
Collection: |
|
10141 - Distributed Usage Control |
Issue Date: |
|
2010 |
Date of publication: |
|
05.08.2010 |