Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society 2016
DOI: 10.1145/2994620.2994627
|View full text |Cite
|
Sign up to set email alerts
|

CPPL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…When sharing data, companies further expect mechanisms to automatically evaluate any allowed secondary use of their shared data, e.g., using data usage policies (Henze 2020;Henze et al 2016). Otherwise, their concerns could effectively prevent collaboration in industry.…”
Section: Infrastructure For Secure Industrial Collaborationmentioning
confidence: 99%
See 1 more Smart Citation
“…When sharing data, companies further expect mechanisms to automatically evaluate any allowed secondary use of their shared data, e.g., using data usage policies (Henze 2020;Henze et al 2016). Otherwise, their concerns could effectively prevent collaboration in industry.…”
Section: Infrastructure For Secure Industrial Collaborationmentioning
confidence: 99%
“…Enriching existing (industrial) infrastructures with appropriate data security requires developments along multiple dimensions. As the most basic mechanism, data usage policies (Henze et al 2016), which efficiently formulate allowed utilization of sensitive data, allow stakeholders to express their privacy and data sovereignty needs. For example, companies can specify details about the suitability of using…”
Section: Data Security and Data Qualitymentioning
confidence: 99%
“…PDLs have been used for over two decades to communicate privacy expectations of consumers and match them with company practices [44]. The first privacy policy language was P3P, which was designed to tackle online privacy concerns of consumers that arise due to difficulties in obtaining information on the privacy practices of websites [45].…”
Section: Policy Rules For Data Sovereigntymentioning
confidence: 99%
“…Data protection PDLs are not limited to companies, for instance, the preference language YaPPL is used to formulate consumers' data protection requirements in IoT contexts [50]. Ideally, the company and consumer side is addressed in system design to realize a semi-automated exchange of consents [27,44,46,51]. However, a few challenges remain.…”
Section: Policy Rules For Data Sovereigntymentioning
confidence: 99%