Safeguarding Personal Data using Rights Management in Distributed Applications

Privacy includes the right to determine the use of personal information after it has been released. Some compliance solutions have been proposed already. However, they are usually monolithic systems operating only within one database system or requiring a customized infrastructure. This paper explores the possibility to use an off-the-shelf document rights management platform to enable enforcement of usage policies. First experiences from a building a demonstration application are encouraging.

[1]  Adolf Hohl,et al.  Safeguarding Personal Data using Rights Management in Pervasive Computing for Distributed Applications , .

[2]  Paul Ashley,et al.  E-P3P privacy policies and privacy authorization , 2002, WPES '02.

[3]  Siani Pearson,et al.  Towards Accountable Management of Privacy and Identity Information , 2003, ESORICS.

[4]  Frank Stajano Will your digital butlers betray you? , 2004, WPES '04.

[5]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[6]  Michael Waidner,et al.  Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.

[7]  Larry Korba,et al.  Towards Meeting the Privacy Challenge: Adapting DRM , 2002, Digital Rights Management Workshop.

[8]  Siani Pearson,et al.  Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[9]  P. Bramhall,et al.  Extending HP Identity Management Solutions to Enforce Privacy Policies and Obligations for Regulatory Compliance by Enterprises ♦ , 2005 .

[10]  Michael Waidner,et al.  Privacy-enabled services for enterprises , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.

[11]  Ramakrishnan Srikant,et al.  Hippocratic Databases , 2002, VLDB.

[12]  Marco Casassa Mont,et al.  Privacy Enforcement with HP Select Access for Regulatory Compliance , 2005 .

[13]  Lorrie Faith Cranor,et al.  Web Privacy with P3p , 2002 .