[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1363686.1364250acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Consistent privacy preferences (CPP): model, semantics, and properties

Published: 16 March 2008 Publication History

Abstract

The Platform for Privacy Preferences (P3P) is a W3C specification that can be used to build useful protocols and services for protecting user privacy on the semantic Web. An outstanding issue is the need for a simple and efficient representation and management of consistent sets of rules for user privacy preferences. Thus we describe a model for privacy preference representation and management that has a number of desirable properties which are lacking in privacy preference models proposed thus far. We detail semantics and properties of matching preference rules with requests. We specify the properties of a consistent set of privacy preferences, and propose maintenance operations. Finally, we describe an implementation of our proposal that uses OWL (Web Ontology Language) and the Jena reasoning engine to illustrate the practicality of managing consistent user preferences in privacy rule-sets. An important advantage of our approach is that the user is encouraged to clarify privacy preferences as he/she modifies them as part of a back-end management task, as opposed to mainly at website interaction times.

References

[1]
Agrawal, R., J. Kierman, R. Srikant, Y. Xu. (2003) An XPath Based Preference Language for P3P, WWW 2003, May 20--24, 2003.
[2]
APPEL. (2002) A P3P Preference Exchange Language 1.0, http://www.w3.org/TR/P3P-preferences/ (Viewed: Sept. 2, 2007)
[3]
Backes, M., Karjoth, G., and Schunter, M. (2004) Efficient Comparison of Enterprise Privacy Policies. SAC '04.
[4]
Barth, A. and Mitchell, J. C. (2005) Enterprise Privacy Promises and Enforcement. In WITS '05.
[5]
Clark, J. and DeRose, S. (1999) XML Path language (XPath) Ver. 1.0. Technical report, W3C Recomm., http://www.w3.org/TR/xpath.
[6]
Cranor L. F. (2003) P3P: Making Privacy Policies More Useful. In IEEE Security & Privacy, (Vol. 1, No. 6, 2003), pp. 50--55.
[7]
Gandon, F. and Sadeh, N. (2004) Semantic Web Technologies to Reconcile Privacy and Context Awareness. In Web Semantics Journal Vol. 1, No. 3, 2004.
[8]
Hogben, G. (2002) A technical analysis of problems with P3P vl.0 and possible solutions. Position paper for "Future of P3P" Workshop, Dulles, Virginia, USA.
[9]
Jena. (2007) Jena -- A Semantic Web Framework for Java, http://jena.sourceforge.net/. Last viewed Sept. 2, 2007.
[10]
Jutla, D. N., Bodorik, P. (2005) Social technical Architecture for Online Privacy, IEEE Security & Privacy, March/April 2005, pp. 24--34.
[11]
Jutla D. N., Bodorik P, Zhang Y. (2006) PeCAN: An Architecture for Privacy-aware Electronic Commerce User Contexts, Elsevier's Information Systems Journal, Vol. 31, Issue 4--5, June-July 2006, pp. 295--320.
[12]
Kagal, L., Kolari, P., Li Ding, S. G, A. Joshi, T. Finin, (2005). Enhancing Web Privacy Protection through Declarative Polices. IEEE Workshop on Policy for Distributed Systems and Networks.
[13]
PrivacyBird. (2007) AT&T Privacy Bird. http://www.privacybird.org/. Last viewed Sept.7, 2007.
[14]
SWAPPEL (2007) P3P Using the Semantic Web (OWL Ontology, RDF Policy and RDQL Rules). http://www.w3.org/P3P/2004/040920_p3p-sw.html. (Sep7, 2007)
[15]
Wang Xuehai. (2005) Maintaining User Preference Consistency for E-Privacy, M. Comp. Sci. Thesis, Dalhousie University, Halifax, Canada.

Cited By

View all
  • (2016)Privacy-Knowledge Modeling for the Internet of ThingsComputer10.1109/MC.2016.36649:12(60-68)Online publication date: 1-Dec-2016
  • (2014)Leveraging Semantic Web Technologies for Access ControlEmerging Trends in ICT Security10.1016/B978-0-12-411474-6.00030-X(493-506)Online publication date: 2014
  • (2014)Empowering Users to Specify and Manage Their Privacy Preferences in e-Government EnvironmentsElectronic Government and the Information Systems Perspective10.1007/978-3-319-10178-1_19(237-245)Online publication date: 2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '08: Proceedings of the 2008 ACM symposium on Applied computing
March 2008
2586 pages
ISBN:9781595937537
DOI:10.1145/1363686
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 March 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. P3P
  2. P3P agent
  3. consistency
  4. privacy preferences
  5. rule-set consistency
  6. semantic web privacy
  7. user privacy control

Qualifiers

  • Research-article

Conference

SAC '08
Sponsor:
SAC '08: The 2008 ACM Symposium on Applied Computing
March 16 - 20, 2008
Fortaleza, Ceara, Brazil

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)2
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Privacy-Knowledge Modeling for the Internet of ThingsComputer10.1109/MC.2016.36649:12(60-68)Online publication date: 1-Dec-2016
  • (2014)Leveraging Semantic Web Technologies for Access ControlEmerging Trends in ICT Security10.1016/B978-0-12-411474-6.00030-X(493-506)Online publication date: 2014
  • (2014)Empowering Users to Specify and Manage Their Privacy Preferences in e-Government EnvironmentsElectronic Government and the Information Systems Perspective10.1007/978-3-319-10178-1_19(237-245)Online publication date: 2014
  • (2012)Enhancing privacy in cloud computing via policy-based obfuscationThe Journal of Supercomputing10.1007/s11227-010-0425-z61:2(267-291)Online publication date: 1-Aug-2012
  • (2010)Privacy-aware policy matchingProceedings of the The IEEE symposium on Computers and Communications10.1109/ISCC.2010.5546733(302-307)Online publication date: 22-Jun-2010
  • (2008)Privacy with Web SerivcesProceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 0310.1109/WIIAT.2008.383(546-549)Online publication date: 9-Dec-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media