MP Machulak, EL Maler, D Catalano… - Proceedings of the 6th …, 2010 - dl.acm.org
Web 2.0 technologies have made it possible to migrate traditional desktop applications to the Web, resulting in a rich and dynamic user experience and in expanded functionality …
L Kagal, H Abelson - W3C Privacy Workshop, 2010 - Citeseer
As Web architects, we might all agree on the need to protect privacy. But what is it that we want to protect? In Brandeis and Warren's classic legal study [19], privacy is defined as the …
The popularity of social-networking sites, blogging and other content-sharing sites has exploded, resulting in more personal information and opinions being available with less …
S Weiss - IFIP International Summer School on the Future of …, 2007 - Springer
New developments on the Internet in the past years have brought up a number of online social networking applications within the so-called Web 2.0 world that experienced …
G Steinke - Telematics and Informatics, 2002 - Elsevier
Consumers using the Internet often indicate that the privacy of their personal data is their foremost concern with the new technology. Different approaches to data privacy and …
PA Bonatti, P Samarati - Journal of Computer Security, 2002 - content.iospress.com
The widespread use of Internet-based services is increasing the amount of information (such as user profiles) that clients are required to disclose. This information demand is necessary …
FJ Daniels, AA Wesley - US Patent 7,403,785, 2008 - Google Patents
the P3P (Platform for Privacy Preferences) specification developed by W3C (the World Wide Web Consortium), defines an industry standard that provides a simple, automated way for …
The sudden popularity of social networks and web 2.0 applications changed radically the Internet landscape and the users' behavior. Today's young people are the first generation …
J Linn - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
The author examines privacy risks to user data in a Web environment and explores the characteristics and roles of technical countermeasures, including mechanized privacy policy …