2012
DOI: 10.3233/wia-2012-0235
|View full text |Cite
|
Sign up to set email alerts
|

Handling privacy as contextual integrity in decentralized virtual communities: The PrivaCIAS framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(21 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…For example, normative multiagent systems have been applied to model the social dimension of cyber-physical systems 3 and to represent and reason about both top-down explicit and bottom-up implicit information-sharing norms. 5,6 In this issue, we have a further example of the application of normative multiagent systems to model, represent, and reason about information-sharing norms in sociotechnical systems. In particular, "Revani: Revising and Verifying Normative Specifications for Privacy" presents a formal representa- This is an exciting opportunity to consider research on cybersecurity for intelligent systems and agents from more than one angle, and we hope that you enjoy the results of this collaboration.…”
Section: Normsmentioning
confidence: 99%
“…For example, normative multiagent systems have been applied to model the social dimension of cyber-physical systems 3 and to represent and reason about both top-down explicit and bottom-up implicit information-sharing norms. 5,6 In this issue, we have a further example of the application of normative multiagent systems to model, represent, and reason about information-sharing norms in sociotechnical systems. In particular, "Revani: Revising and Verifying Normative Specifications for Privacy" presents a formal representa- This is an exciting opportunity to consider research on cybersecurity for intelligent systems and agents from more than one angle, and we hope that you enjoy the results of this collaboration.…”
Section: Normsmentioning
confidence: 99%
“…In a more recent work, Krupa et al [43] proposed a framework to enforce information sharing norms in an electronic institution where norms, contexts and roles are explicitly defined. While these approaches seem appropriate for the kind of domains described in [4] and [43], in OSNs there are not well-known contexts, there is not an explicit definition of the roles played by users and the exchange of information is governed by implicit information sharing norms 13 .…”
Section: Contextual Integrity Modelling and Reasoningmentioning
confidence: 99%
“…Computational models of contextual integrity have been recently proposed in the related literature [4,43]. Following contextual integrity theory, they assume the existence of welldefined contexts, in which individuals enact pre-defined roles and information sharing is governed by an explicit set of norms.…”
Section: Introductionmentioning
confidence: 99%
“…-Finally, the fact that people share personal information raises privacy problems, exacerbated by the use of web technologies and its possibilities of information access, propagation and processing. Krupa et al [3] address this problem with a multi-agent approach to privacy preservation.…”
Section: Papers Of the Special Issuementioning
confidence: 99%