Enforcing P3P policies using a digital rights management system

Farzad Salim, Nicholas Paul Sheppard, Rei Safavi-Naini

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

11 Citations (Scopus)

Abstract

![CDATA[The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that protects private data through the enforcement of licenses provided by consumers. Prior to supplying data, data owners are expected to construct a detailed license for the potential data users. A license specifies whom, under what conditions, may have what type of access to the protected data. The specification of a license by a data owner binds the enterprise data handling to the consumer's privacy preferences. However, licenses are very detailed, may reveal the internal structure of the enterprise and need to be kept synchronous with the enterprise privacy policy. To deal with this, we employ the Platform for Privacy Preferences Language (P3P) to communicate enterprise privacy policies to consumers and enable them to easily construct data licenses. A P3P policy is more abstract than a license, allows data owners to specify the purposes for which data are being collected and directly reflects the privacy policy of an enterprise.]]
Original languageEnglish
Title of host publicationPrivacy Enhancing Technologies: Revised Selected Papers of the 7th International Symposium, PET 2007, Ottawa, Canada, 20-22 June 2007
PublisherSpringer
Pages200-217
Number of pages18
ISBN (Print)9783540755500
DOIs
Publication statusPublished - 2007
EventInternational Symposium on Privacy Enhancing Technologies -
Duration: 20 Jun 2007 → …

Publication series

Name
ISSN (Print)0302-9743

Conference

ConferenceInternational Symposium on Privacy Enhancing Technologies
Period20/06/07 → …

Keywords

  • computer security
  • digital rights management
  • licenses
  • privacy

Fingerprint

Dive into the research topics of 'Enforcing P3P policies using a digital rights management system'. Together they form a unique fingerprint.

Cite this