The 2010 14th International Conference on Computer Supported Cooperative Work in Design 2010
DOI: 10.1109/cscwd.2010.5471981
|View full text |Cite
|
Sign up to set email alerts
|

A framework for privacy policy management in service aggregation

Abstract: With a rapid growth of the Internet, exploring cost-effective and time-efficient methods for creating Internet services has become critical. As an emerging technology, service aggregation has been regarded as a promising candidate. However, it also raises serious issues on privacy management, as a service is usually provided by multiple providers that are usually transparent to its users. We observe that these issues have not been formally studied in the literature. In this paper, we propose a formal model for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Their metrics were rather vague since their analysis compared the number and category of goals in policies rather than what those goals really meant. Wang et al [29] proposed a formal privacy policy management framework for aggregation of privacy policies from different service providers. They have addressed the issue of privacy leakage caused by database aggregation from different vendors by suggesting a formal negotiation protocol.…”
Section: B Modeling Privacy Policies and Investigation Warrantsmentioning
confidence: 99%
“…Their metrics were rather vague since their analysis compared the number and category of goals in policies rather than what those goals really meant. Wang et al [29] proposed a formal privacy policy management framework for aggregation of privacy policies from different service providers. They have addressed the issue of privacy leakage caused by database aggregation from different vendors by suggesting a formal negotiation protocol.…”
Section: B Modeling Privacy Policies and Investigation Warrantsmentioning
confidence: 99%
“…First, we extend the known model of service aggregation to a cloud environment. A general diagram illustrating the high‐level architecture of service aggregation in a cloud computing environment is shown in Figure .…”
Section: Service Aggregation In the Cloudmentioning
confidence: 99%
“…They collaborate in highly distributed environments and establish on-demand, short-term and dynamic business relationships for purposes such as maximizing profitability [17]. In order to understand the requirement of authentication in service aggregation, we first explain some terms as follows.…”
Section: Service Aggregationmentioning
confidence: 99%