Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy and online social networks: Can colorless green ideas sleep furiously?
B Krishnamurthy - IEEE Security & Privacy, 2013 - ieeexplore.ieee.org
One definition of privacy is the selective revelation of information about oneself. With billions
of people using social media, it's increasingly difficult for users to control what they're …
of people using social media, it's increasingly difficult for users to control what they're …
[PDF][PDF] Contextual integrity through the lens of computer science
The theory of Privacy as Contextual Integrity (CI) defines privacy as appropriate information
flow according to norms specific to social contexts or spheres. CI has had uptake in different …
flow according to norms specific to social contexts or spheres. CI has had uptake in different …
Privacy-respecting digital investigation
The forensics investigation requirements are in direct conflict with the privacy rights of those
whose actions are being investigated. At the same time, once the private data is exposed it …
whose actions are being investigated. At the same time, once the private data is exposed it …
Automating governing knowledge commons and contextual integrity (GKC-CI) privacy policy annotations with large language models
Identifying contextual integrity (CI) and governing knowledge commons (GKC) parameters in
privacy policy texts can facilitate normative privacy analysis. However, GKC-CI annotation …
privacy policy texts can facilitate normative privacy analysis. However, GKC-CI annotation …
Situated information flow theory
S Benthall - Proceedings of the 6th Annual Symposium on Hot …, 2019 - dl.acm.org
A key component of recent privacy rules is restriction on the flows of personal information or
data based on information categories. This tendency conflicts with the fact that data's …
data based on information categories. This tendency conflicts with the fact that data's …
Efficient enforcement of action-aware purpose-based access control within relational database management systems
Among the variety of access control models proposed for database management systems
(DBMSs) a key role is covered by the purpose-based access control model, which, while …
(DBMSs) a key role is covered by the purpose-based access control model, which, while …
A formal privacy policy framework for social networks
Social networks (SN) provide a great opportunity to help people interact with each other in
different ways depending on the kind of relationship that links them. One of the aims of SN is …
different ways depending on the kind of relationship that links them. One of the aims of SN is …
Publishing privacy logs to facilitate transparency and accountability
Compliance with privacy policies imposes requirements on organizations and their
information systems. Maintaining auditable privacy logs is one of the key mechanisms …
information systems. Maintaining auditable privacy logs is one of the key mechanisms …
Correct audit logging: Theory and practice
Retrospective security has become increasingly important to the theory and practice of cyber
security, with auditing a crucial component of it. However, in systems where auditing is used …
security, with auditing a crucial component of it. However, in systems where auditing is used …
Designing fiduciary artificial intelligence
S Benthall, D Shekman - Proceedings of the 3rd ACM conference on …, 2023 - dl.acm.org
A fiduciary is a trusted agent that has the legal duty to act with loyalty and care towards a
principal that employs them. When fiduciary organizations interact with users through a …
principal that employs them. When fiduciary organizations interact with users through a …