Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy
In this paper we discuss some of these problems within the context of a P3P environment. In discussing these problems we focus our attention on the identification of a Proxy within a P3P environment and the separation of a Proxy’s policy from the policy of a site being accessed through it.
Unable to display preview. Download preview PDF.
- 1.Coyle, K.: P3P: Pretty Poor Privacy? A Social analysis of the Platform for Privacy Preferences (June 1999), available via the World Wide Web at: http://www.kcoyle.net/p3p.html
- 2.Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.1 (P3P1.1) Specification, W3C Working Draft (2005)Google Scholar
- 3.Cranor, L., Reagle, J.: The Platform for Privacy Preferences. Communications of the ACM 4(2), 48–55 (1999)Google Scholar
- 4.Davidson, B.: A survey of Proxy cache evaluation techniques. In: Proceedings of the 4th International Web Caching Workshop (1999)Google Scholar
- 6.Demuth, T.: A Passive Attack on the Privacy of Web Users Using Standard Log Information. Privacy Enhancing Technologies, 179–193 (2002)Google Scholar
- 7.Felten, E., Schneide, M.: Timing Attacks on Web Privacy. In: ACM Conference on Computer and Communications Security (CCS) (2000)Google Scholar
- 8.Hochheiser, H.: The Platform for Privacy Preference as a Social Protocol: An Examination Within the US Policy Context. ACM Transactions on Internet Technology (TOIT) (2002)Google Scholar
- 9.Marchiori, M.: The HTTP header for the Platform for Privacy Preferences 1.0 (P3P1.0), Network Working Group, Internet-Draft (August 2002), available via the World Wide Web at: http://www.w3.org/2002/04/P3Pv1-header.html
- 10.Thibadeau, R.: A Critique of P3P: Privacy on the Web (August 2000), available via the World Wide Web at: http://dollar.ecom.cmu.edu/p3pcritique/