Usable privacy and security for personal information management

被引:15
|
作者
Karat, CM [1 ]
Brodie, C [1 ]
Karat, J [1 ]
机构
[1] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY 10532 USA
关键词
D O I
10.1145/1107458.1107491
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IBM T.J. Watson Research Center in Hawthorne, NY, focuses on the design and development of policy SPARCLE, authoring and transformation tools that enable organizations to create machine-readable policies for real-time enforcement decisions. Usable privacy and security technology is a critical need in the management of personal information, and should be a part of the initial design considerations for technology applications, systems, and devices that involves personal information collection, access, and communications. SPARCLE will enable individuals to be able to know that the policies are enforced within the organizations by their own processes. The prototype workbench transforms natural language rules through the use of natural language parsing technology into machine-readable XML code. The tools promise to give organizations a verifiable path from the written form of privacy rule to real-time enforcement decisions regarding access to personal information.
引用
收藏
页码:56 / 57
页数:2
相关论文
共 50 条
  • [31] Personal and Ubiquitous ComputingIssue on privacy and security
    Chris Schmandt
    Mark Ackerman
    Personal and Ubiquitous Computing, 2004, 8 : 389 - 390
  • [32] Security and Privacy Issues of Personal Health
    Blobel, Bernd
    Pharow, Peter
    MEDICAL AND CARE COMPUNETICS 4, 2007, 127 : 288 - 297
  • [33] Privacy and pricing personal information
    Jaisingh, Jeevan
    Barron, Jack
    Mehta, Shailendra
    Chaturvedi, Alok
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2008, 187 (03) : 857 - 870
  • [34] Adaptive Information Security and Privacy
    Nuseibeh, Bashar
    2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 17 - 17
  • [35] Security and privacy in the information economy
    Feigenbaum, J
    Rudich, S
    Blaze, M
    McCurley, K
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 1997, 94 (07) : 2789 - 2792
  • [36] Privacy and security of medical information
    Jobes, KE
    White, ER
    Antonelli, PJ
    OTOLARYNGOLOGIC CLINICS OF NORTH AMERICA, 2002, 35 (06) : 1203 - +
  • [37] Privacy and security of donor personal information maintained on portable computers used for mobile collection
    Shakotko, D
    TRANSFUSION, 2004, 44 (09) : 147A - 147A
  • [38] Advances in Information Security and Privacy
    Lax, Gianluca
    Russo, Antonia
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [39] Usable Security Management with Host Identity Protocol
    Karvonen, Kristiina
    Komu, Miika
    Gurtov, Andrei
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 279 - 286
  • [40] Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE)
    Jung, Jaeyeon
    Kohno, Tadayoshi
    PROCEEDINGS OF THE 2014 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP'14 ADJUNCT), 2014, : 1279 - 1282