Privacy and online social networks: Can colorless green ideas sleep furiously?

B Krishnamurthy - IEEE Security & Privacy, 2013 - ieeexplore.ieee.org
One definition of privacy is the selective revelation of information about oneself. With billions
of people using social media, it's increasingly difficult for users to control what they're …

[PDF][PDF] Contextual integrity through the lens of computer science

S Benthall, S Gürses, H Nissenbaum - Foundations and Trends® in …, 2017 - sbenthall.net
The theory of Privacy as Contextual Integrity (CI) defines privacy as appropriate information
flow according to norms specific to social contexts or spheres. CI has had uptake in different …

Privacy-respecting digital investigation

A Dehghantanha, K Franke - 2014 twelfth annual international …, 2014 - ieeexplore.ieee.org
The forensics investigation requirements are in direct conflict with the privacy rights of those
whose actions are being investigated. At the same time, once the private data is exposed it …

Situated information flow theory

S Benthall - Proceedings of the 6th Annual Symposium on Hot …, 2019 - dl.acm.org
A key component of recent privacy rules is restriction on the flows of personal information or
data based on information categories. This tendency conflicts with the fact that data's …

Efficient enforcement of action-aware purpose-based access control within relational database management systems

P Colombo, E Ferrari - IEEE Transactions on Knowledge and …, 2015 - ieeexplore.ieee.org
Among the variety of access control models proposed for database management systems
(DBMSs) a key role is covered by the purpose-based access control model, which, while …

A formal privacy policy framework for social networks

R Pardo, G Schneider - Software Engineering and Formal Methods: 12th …, 2014 - Springer
Social networks (SN) provide a great opportunity to help people interact with each other in
different ways depending on the kind of relationship that links them. One of the aims of SN is …

Publishing privacy logs to facilitate transparency and accountability

R Samavi, MP Consens - Journal of Web Semantics, 2018 - Elsevier
Compliance with privacy policies imposes requirements on organizations and their
information systems. Maintaining auditable privacy logs is one of the key mechanisms …

Correct audit logging: Theory and practice

S Amir-Mohammadian, S Chong, C Skalka - International Conference on …, 2016 - Springer
Retrospective security has become increasingly important to the theory and practice of cyber
security, with auditing a crucial component of it. However, in systems where auditing is used …

Designing fiduciary artificial intelligence

S Benthall, D Shekman - Proceedings of the 3rd ACM conference on …, 2023 - dl.acm.org
A fiduciary is a trusted agent that has the legal duty to act with loyalty and care towards a
principal that employs them. When fiduciary organizations interact with users through a …