2006 Second IEEE International Symposium on Service-Oriented System Engineering (SOSE'06) 2006
DOI: 10.1109/sose.2006.3
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Assessment Approach for Serviced Oriented Architecture Application

Abstract: Web services are middle-tier technologies used to access backend applications to perform various operations. Their usage has significantly increased in ecommerce applications since their introduction. Because of their wide usage, security in web services has become an important point of interest for many. User data provided by users during their transactions with online web services can be stolen and illegally used. Thus web service providers have started to strengthen security. This can lead to lack of user p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…To fulfill privacy protection, developer and designer select suitable existing plug-ins and build new plug-ins for missing controls. Thus our work extends from simply assessment to a more practical guideline as compared to previous work [35].…”
Section: B Assessing Elggmentioning
confidence: 97%
“…To fulfill privacy protection, developer and designer select suitable existing plug-ins and build new plug-ins for missing controls. Thus our work extends from simply assessment to a more practical guideline as compared to previous work [35].…”
Section: B Assessing Elggmentioning
confidence: 97%
“…From this same perspective, Lichtenstein and Swatman [32] Anthonysamy et al [33] and Yu et al [34] have sought to add value to the privacy policies aspect through the development of guidelines, approaches, and methods. Yu et al [34] point out the importance of anonymity and confidentiality as points that must be specified by policies to establish trust and ensure user privacy.…”
Section: Related Workmentioning
confidence: 99%
“…From this same perspective, Lichtenstein and Swatman [32] Anthonysamy et al [33] and Yu et al [34] have sought to add value to the privacy policies aspect through the development of guidelines, approaches, and methods. Yu et al [34] point out the importance of anonymity and confidentiality as points that must be specified by policies to establish trust and ensure user privacy. The authors emphasize that policy documents should explicitly explain how users' personal information, which is provided in login or financial transactions, are protected, and under what circumstances these applications may disclose such information, i.e., in cases required by law.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…An approach to evaluate the privacy compliance level of Web service applications was developed [13]. The approach includes a component called privacy policy checker, which can be plugged into applications to perform different verifications.…”
Section: A Privacy Protection In Soamentioning
confidence: 99%