19 research outputs found

    ADVERTISEMENT SOFTWARE DEVELOPMENT KIT UNBUNDLING

    Get PDF
    A system described herein enables advertisement software development kits (SDKs) to be unbundled from applications that use advertisement SDKs. The system provides SDK proxy libraries and advertisement services developed based on the advertisement SDKs. The SDK proxy libraries replace original calls to advertisement SDKs with inter-protocol communication (IPC) calls. The advertisements services receive the IPC calls and, in response, generate views that include advertisements. The advertisement services provide the views to the applications. Rather than the application determining the advertisement views and/or clicks, the system described herein enables the advertisement services to validate views and/or clicks of the advertisement separately from the application. In this way, the system described in this disclosure may prevent the applications from generating fake clicks or fake views while preventing the advertisement services from accessing sensitive data collected by the applications

    Application Report: an Extensible Policy Editing API for Privacy and Identity Management

    No full text
    This paper describes an open source policy editing API, whichhas been developed for use with privacy policies includingP3P1.1 policies, semantic web privacy policies and enterpriseprivacy policies. The API has been designed to be extensible to a wide range of policy editors for access privacy and identitymanagement. It is also designed to support the use of ontologiesto specify validated and updateable human readable translationsof policy elements. It provides libraries for editing any kind of policy which is associated to URI resources and which describesbehaviour in terms of discrete statements. The paper gives a briefoverview of new features of the API which have allowed us to generalize its application.JRC.G.6-Sensors, radar technologies and cybersecurit

    Rule Language Requirements for Privacy-Enabled Identity Management

    No full text
    The overall use case that motivates this position paper is a privacy-enabled identity management system using semantic web technologies. By this, we mean a system that uses a set of RDF-based languages to * exchange instance data - often personal information - between clients and services * express client-side preferences * express contextual and assurance requirements * express service-side policies * express the agreements reached between clients and services * express the obligations that arise from these agreements. In discussing rule use cases and requirements, this position paper focuses on those requirements that are characteristic to the privacy-enabled identity management problem. Both preferences and policies can be cast in rule-like semantics, as both deal with conditions about what is acceptable, and what is not. In general two categories of rules are of relevance: inference rules and reactive rules. Specifically, we want to make a case for reactive rules in the context of privacy management. ECA reactive rules (Event-Condition-Action rules) are required to express access control policies, assurance policies and obligation policies. As a significant example we consider privacy obligations. Privacy obligations fit the reactive rule pattern: they define data lifecycle management practices including supported handling policies and under what conditions certain actions have to be taken.JRC.G.6-Sensors, radar technologies and cybersecurit

    On the ontology of Digital Identification

    No full text
    Abstract. Existing technical and legal definitions of identification and closely related privacy concepts show a confused and often circular semantics, in particular when applied to a digital environment. We examine the ontology of digital identification in the wider context of privacy. We begin with a formal definition of the ´identical ´ relation between 2 nyms and from this we derive a quantifiable notion of identification based on linkability and its opposite, anonymity. We base our logical model on a 3 layered semantic model theory. The results of this modeling show the context dependence of identification. Identification has meaning only in relation to a set of individuals known as the anonymity set, and an existing knowledge base of facts about these individuals. 1 Introduction and Survey of Current Models of Identity Digital identities are fast becoming the most important and coveted assets in the information society. For example, the US Federal Trade Commission estimates that complaints about identity theft doubled in 2002. However, a survey of regulatory descriptions of identity reveals a lot of confusion. The US patriot act, 2001 [1], mention
    corecore