Enhancing User Privacy Through Data Handling Policies

  • C. A. Ardagna
  • S. De Capitani di Vimercati
  • P. Samarati
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4127)


The protection of privacy is an increasing concern in today’s global infrastructure. One of the most important privacy protection principles states that personal information collected for one purpose may not be used for any other purpose without the specific informed consent of the person it concerns. Although users provide personal information for use in one specific context, they often have no idea on how such a personal information may be used subsequently.

In this paper, we introduce a new type of privacy policy, called data handling policy, which defines how the personal information release will be (or should be) dealt with at the receiving party. A data handling policy allows users to define simple and appropriate levels of control over who sees what information about them and under which circumstances.


Service Provider Access Control Personal Information Policy Language Access Control Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: An xpath based preference language for P3P. In: Proc. of the 12th International World Wide Web Conference, Budapest, Hungary (May 2003)Google Scholar
  2. 2.
    Ahn, G.-J., Lam, J.: Managing privacy preferences in federated identity management. In: Proc. of the ACM Workshop on Digital Identity Management (In conjunction with 12th ACM Conference on Computer and Communications Security), Fairfax, VA, USA (November 2005)Google Scholar
  3. 3.
    Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.d.C., Samarati, P.: Supporting location-based conditions in access control policies. In: Proc. of the ASIACCS 2006, Taipei, Taiwan (March 2006)Google Scholar
  4. 4.
    Ardagna, C.A., Damiani, E., di Vimercati, S.d.C., Samarati, P.: Towards privacy-enhanced authorization policies and languages. In: Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (IFIP), Nathan Hale Inn, University of Connecticut, Storrs, USA (2005)Google Scholar
  5. 5.
    Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-p3p privacy policies and privacy authorization. In: Proc. of the ACM Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA (November 2002)Google Scholar
  6. 6.
    Bettini, C., Jajodia, S., Sean Wang, X., Wijesekera, D.: Provisions and obligations in policy management and security applications. In: Proc. of the 28th VLDB Conference, Hong Kong, China (August 2002)Google Scholar
  7. 7.
    Bonatti, P.A., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: Proc. of the IEEE 6th International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Stockholm, Sweden (June 2005)Google Scholar
  8. 8.
    Bonatti, P.A., Samarati, P.: A unified framework for regulating access and information release on the web. Journal of Computer Security 10(3), 241–272 (2002)CrossRefGoogle Scholar
  9. 9.
    Chandramouli, R.: Privacy protection of enterprise information through inference analysis. In: IEEE 6th International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Stockholm, Sweden (June 2005)Google Scholar
  10. 10.
    Cranor, L.F.: Web Privacy with P3P. O’Reilly & Associates, Sebastopol (2002)Google Scholar
  11. 11.
    eXtensible Access Control Markup Language (XACML) Version 2.0 pdf (February 2005), http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os
  12. 12.
    Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol. 3053, pp. 342–356. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  13. 13.
    International security, trust, and privacy alliance (istpa), http://www.istpa.org/
  14. 14.
    Karjoth, G., Schunter, M.: Privacy policy model for enterprises. In: Proc. of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada (June 2002)Google Scholar
  15. 15.
  16. 16.
    Privacy and identity management for europe (PRIME), http://www.prime-project.eu.org/
  17. 17.
    Samarati, P., di Vimercati, S.d.C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, p. 137. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  18. 18.
    Thuraisingham, B.: Privacy constraint processing in a privacy-enhanced database management system. Data & Knowledge Engineering 55(2), 159–188 (2005)CrossRefGoogle Scholar
  19. 19.
    World Wide Web Consortium. A P3P Preference Exchange Language 1.0 (APPEL1.0) (April 2002), http://www.w3.org/TR/P3P-preferences/
  20. 20.
    World Wide Web Consortium. The Platform for Privacy Preferences 1.1 (P3P1.1) Specification (July 2005), http://www.w3.org/TR/2005/WD-P3P11-20050701
  21. 21.
    Youssef, M., Atluri, V., Adam, N.R.: Preserving mobile customer privacy: An access control system for moving objects and customer profiles. In: Proc. of the 6th International Conference on Mobile Data Management, Ayia Napa, Cyprus (May 2005)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2006

Authors and Affiliations

  • C. A. Ardagna
    • 1
  • S. De Capitani di Vimercati
    • 1
  • P. Samarati
    • 1
  1. 1.Dipartimento di Tecnologie dell’InformazioneUniversità degli Studi di MilanoCremaItaly

Personalised recommendations