Information accountability
- 1 June 2008
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 51 (6), 82-87
- https://doi.org/10.1145/1349026.1349043
Abstract
With access control and encryption no longer capable of protecting privacy, laws and systems are needed that hold people accountable for the misuse of personal information, whether public or secret.Keywords
This publication has 5 references indexed in Scilit:
- A Semantic Web approach to the provenance challengeConcurrency and Computation: Practice and Experience, 2007
- Conflict and combination in privacy policy languagesPublished by Association for Computing Machinery (ACM) ,2004
- Recording and Reasoning over Data Provenance in Web and Grid ServicesLecture Notes in Computer Science, 2003
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001