dc.contributor.author |
Lioudakis, GV |
en |
dc.contributor.author |
Koutsoloukas, EA |
en |
dc.contributor.author |
Dellas, N |
en |
dc.contributor.author |
Kapellaki, S |
en |
dc.contributor.author |
Prezerakos, GN |
en |
dc.contributor.author |
Kaklamani, DI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.date.accessioned |
2014-03-01T02:44:24Z |
|
dc.date.available |
2014-03-01T02:44:24Z |
|
dc.date.issued |
2007 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/31800 |
|
dc.subject |
Ontologies |
en |
dc.subject |
Privacy |
en |
dc.subject |
Privacy legislation |
en |
dc.subject |
Privacy middleware |
en |
dc.subject.other |
Computer software |
en |
dc.subject.other |
Data privacy |
en |
dc.subject.other |
Internet |
en |
dc.subject.other |
Laws and legislation |
en |
dc.subject.other |
Middleware |
en |
dc.subject.other |
(OTDR) technology |
en |
dc.subject.other |
Data protection |
en |
dc.subject.other |
Discreet (CO) |
en |
dc.subject.other |
General (CO) |
en |
dc.subject.other |
In order |
en |
dc.subject.other |
international conferences |
en |
dc.subject.other |
middleware systems |
en |
dc.subject.other |
On-line services |
en |
dc.subject.other |
personal information |
en |
dc.subject.other |
Personalized services |
en |
dc.subject.other |
policy framework |
en |
dc.subject.other |
Privacy requirements |
en |
dc.subject.other |
Technical solutions |
en |
dc.subject.other |
user privacy |
en |
dc.subject.other |
Electric breakdown |
en |
dc.title |
A proxy for privacy: The discreet box |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/EURCON.2007.4400521 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/EURCON.2007.4400521 |
en |
heal.identifier.secondary |
4400521 |
en |
heal.publicationDate |
2007 |
en |
heal.abstract |
The issue of user privacy is constantly brought to the spotlight since an ever Increasing number of online services collects and processes personal information from users, in the context of personalized service provision. Although technology makes the collection of data easy, their protection against abuse is left to data protection legislation. However, the privacy requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down In the technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and avoid the misuse of personal data, this paper discusses an architectural proposal for a middleware system that will enforce protection of user privacy through technical means. This goal is facilitated by a combination of a policy framework, a sensible interpretation of regulations into policies and the introduction of a privacy broker, named the Discreet Box. |
en |
heal.journalName |
EUROCON 2007 - The International Conference on Computer as a Tool |
en |
dc.identifier.doi |
10.1109/EURCON.2007.4400521 |
en |
dc.identifier.spage |
966 |
en |
dc.identifier.epage |
973 |
en |