2003
DOI: 10.1007/978-3-540-40956-4_12
|View full text |Cite
|
Sign up to set email alerts
|

A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…The secure-privacy and privacy-laws will protect the information of individuals and enterprises. In secure-privacy, it is potential to recognize the end-users along with their realistic efforts based on the information that the system or network gathers and then it applies to adapted systems [2]. The many countries formed the privacy laws for processing and restricting the personal data in the regional-globalregional territory.…”
Section: Operational Secure-privacy and Privacy-lawsmentioning
confidence: 99%
See 1 more Smart Citation
“…The secure-privacy and privacy-laws will protect the information of individuals and enterprises. In secure-privacy, it is potential to recognize the end-users along with their realistic efforts based on the information that the system or network gathers and then it applies to adapted systems [2]. The many countries formed the privacy laws for processing and restricting the personal data in the regional-globalregional territory.…”
Section: Operational Secure-privacy and Privacy-lawsmentioning
confidence: 99%
“…The many countries formed the privacy laws for processing and restricting the personal data in the regional-globalregional territory. In present days, most of software designers are willing to design the software applications with higher quality of secure and privacy execution [2]. In addition of identification of secure based components, it is mandatory to identify the privacy based components to avoid the various internal-externalinternal secure threads and vulnerabilities.…”
Section: Operational Secure-privacy and Privacy-lawsmentioning
confidence: 99%
“…First, the anonymous [6] or pseudonymous [6] are methods which use a pen name to prevent the exposure of information such as its owner's identity from being posted in personal media. But there is some defects that user's identity can be detected by inferring and the social networks can be broken.…”
Section: Related Workmentioning
confidence: 99%
“…In order to enable personalized web-based systems to respect users' individual privacy constraints, Kobsa [8] proposed a user modeling framework that encapsulates different personalization methods in individual components and, at any point during runtime, ensures that only those components that comply with current privacy constraints can be used. We adopted a Product Line Architecture (PLA) approach to implement this design.…”
Section: Our Privacy-enhancing User Modeling Frameworkmentioning
confidence: 99%