Skip to main content

Part of the book series: Data-Centric Systems and Applications ((DCSA))

  • 2361 Accesses

Abstract

Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes it inside the enterprise and shares it with partner enterprises. In particular, we analyse three different privacy systems that can be used in the different stages of this lifecycle. One of them is the audit logic, recently introduced, which can be used to keep data private while travelling across enterprise boundaries. We conclude with an analysis of the features and shortcomings of these systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. EU Parliament and Council: The data protection directive (95/46/EC) (1995)

    Google Scholar 

  2. EU Parliament and Council: Directive on privacy and electronic communications (2002/58/EC) (2002)

    Google Scholar 

  3. S. Byers, L.F. Cranor, D. Kormann: Automated analysis of P3P-enabled web sites. In: Proc. Int. Conf. on Electronic Commerce (ICEC). (2003) pp. 326–338

    Google Scholar 

  4. L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, J. Reagle: The Platform for Privacy Preferences 1.0 (P3P 1.0) specification — W3C recommendation 16 april 2002. http://w3.org/TR/P3P (2002)

    Google Scholar 

  5. G. Karjoth, M. Schunter, M. Waidner: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In R. Dingledine, P.F. Syverson eds.: Proc. Int. Workshop on Privacy Enhancing Technologies (PET). Lectures in Computer Science, Springer (2002) pp. 69–84

    Google Scholar 

  6. J.G. Cederquist, R. Corin, M.A.C. Dekker, S. Etalle, J.I. den Hartog: An audit logic for accountability. In Winsborough, W., Sahai, A., eds.: Proc. Int. Workshop on Policies for Distributed Systems and Networks (POLICY), IEEE Computer Society Press (2005) pp. 34–43

    Google Scholar 

  7. A.R. Beresford, F. Stajano: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1) (2003) pp. 46–55

    Article  Google Scholar 

  8. H. Hochheiser: The platform for privacy preference as a social protocol: An examination within the U.S. policy context. ACM Transactions on Internet Technology (TOIT) 2(4) (2002) pp. 276–306

    Article  Google Scholar 

  9. T. Yu, N. Li, A.I. Antón: A formal semantics for P3P. In: Proc. Workshop On Secure Web Service (SWS), ACM Press (2004) pp. 1–8

    Google Scholar 

  10. M. Schunter, E.V. Herreweghen, M. Waidner: Expressive Privacy promises-how to improve P3P. W3C Workshop on the Future of P3P (2002)

    Google Scholar 

  11. J. Cattlet: Open letter to P3P developers. http://junkbusters.com/standards.html (1999)

    Google Scholar 

  12. P. Ashley, S. Hada, G. Karjoth, M. Schunter: E-P3P privacy policies and privacy authorization. In Samarati, P., ed.: Proc. Workshop on Privacy in the Electronic Society (WPES), ACM Press (2002) pp. 103–109

    Google Scholar 

  13. P. Ashley, S. Hada, G. Karjoth, M. Schunter: (Enterprise privacy authorization language (EPAL 1.2)-W3C member submission 10 november 2003)

    Google Scholar 

  14. M. Backes, B. Pfitzmann, M. Schunter: A toolkit for managing enterprise privacy policies. In Gollmann, D., Snekkenes, E., eds.: Proc. European Symp. on Research in Computer Security (ESORICS), Springer (2003) pp. 162–180

    Google Scholar 

  15. G. Karjoth, M. Schunter, E.V. Herreweghen: Translating privacy practices into privacy promises-how to promise what you can keep. In: Proc. Int. Workshop on Policies for Distributed Systems and Networks (POLICY), IEEE Computer Society Press (2003) pp. 135–146

    Google Scholar 

  16. S. Jajodia, P. Samarati, V.S. Subrahmanian, E. Bertino: A unified framework for enforcing multiple access control policies. In Peckham, J., ed.: Proc. Int. Conf. on Management of Data (SIGMOD), ACM Press (1997) pp. 474–485

    Google Scholar 

  17. J. Park, R. Sandhu: Towards usage control models: Beyond traditional access control. In E. Bertino ed.: Proc. Symp. on Access Control Models and Technologies (SACMAT), ACM Press (2002) pp. 57–64

    Google Scholar 

  18. R. Sandhu, P. Samarati: Access control: Principles and practice. IEEE Communications Magazine 32(9) (1994) pp. 40–48

    Article  Google Scholar 

  19. C.N. Chong, R. Corin, S. Etalle, P.H. Hartel, W. Jonker, Y.W. Law: Licens-eScript: A novel digital rights language and its semantics. In K. Ng, C. Busch, P. Nesi eds.: Proc. Int. Conf. on Web Delivering of Music (WEDELMUSIC), IEEE Computer Society Press (2003) pp. 122–129

    Google Scholar 

  20. C. Conrado, M. Petkovic, M. van der Veen, W. van der Velde: Controlled sharing of personal content using digital rights management. In E. Fernández-Medina, J.C. Hernández, L.J. García eds.: Proc. Int. Workshop On Security in Information Systems (WOSIS) (2005) pp. 173–185

    Google Scholar 

  21. C.N. Chong, Z. Peng, P.H. Hartel: Secure audit logging with tamper-resistant hardware. In Gritzalis, D., di Vimercati, S.D.C., Samarati, P., Katsikas, S.K., eds.: IFIP Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), Springer (2003) pp. 73–84

    Google Scholar 

  22. L. Cranor, M. Langheinric, M. Marchiori: A P3P preference exchange language 1.0 (APPEL 1.0) (2002)

    Google Scholar 

  23. O. Lassila, R.P. Swick: Resource Description Framework (RDF) Model and Syntax Specification — W3C Recommendation 22 February 1999 (2002)

    Google Scholar 

  24. S. Jajodia, P. Samarati, M.L. Sapino, V.S. Subrahmanian: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2) (2001) pp. 214–260

    Article  Google Scholar 

  25. S. Jajodia, M. Kudo, S. Subrahmanian: Provisional authorization. (In: Proc. 1st Int. Workshop on Security and Privacy in E-Commerce (WSPEC))

    Google Scholar 

  26. OASIS Access Control TC: eXtensible Access Control Markup Language (XACML) Version 2.0 — Oasis Standard, 1 Feb 2005 (2005)

    Google Scholar 

  27. A. Anderson: Comparison of two privacy languages: EPAL and XACML. Sun Technical Report TR-2005-147 (2005)

    Google Scholar 

  28. W.H. Stufflebeam, A.I. Antón, Q. He, N. Jain: Specifying privacy policies with P3P and EPAL: lessons learned. In: Proc. Workshop on Privacy in the Electronic Society (WPES). (2004) p. 35

    Google Scholar 

  29. J. Park, R. Sandhu: Originator control in usage control. In: Proc. Int. Workshop on Policies for Distributed Systems and Networks (POLICY), Washington, DC, USA, IEEE Computer Society (2002) p. 60

    Chapter  Google Scholar 

  30. M. Abadi: Logic in access control. In Kolaitis, P.G., ed.: Proc. Symp. on Logic in Computer Science (LICS), IEEE Computer Society Press (2003) pp. 228–233

    Google Scholar 

  31. A.W. Appel, E.W. Felten: Proof-carrying authentication. In Tsudik, G., ed.: Proc. Conf. on Comp. and Comm. Sec. (CCS), ACM Press (1999) pp. 52–62

    Google Scholar 

  32. R.L. Rivest, B. Lampson: SDSI — A simple distributed security infrastructure. Presented at CRYPTO’96 Rumpsession (1996)

    Google Scholar 

  33. N. Li, B.N. Grosof, J. Feigenbaum: Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC) 6(1) (2003) pp. 128–171

    Article  Google Scholar 

  34. V. Shmatikov, C.L. Talcott: Reputation-based trust management. Journal of Computer Security 13(1) (2005) pp. 167–190

    Google Scholar 

  35. J.Y. Halpern, V. Weissman: Using first-order logic to reason about policies. In Focardi, R., ed.: Proc. Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press (2003) pp. 187–201

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Dekker, M., Etalle, S., den Hartog, J. (2007). Privacy Policies. In: Petković, M., Jonker, W. (eds) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69861-6_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69860-9

  • Online ISBN: 978-3-540-69861-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics