Guenter Karjoth
IBM
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Guenter Karjoth.
ieee international workshop on policies for distributed systems and networks | 2003
Guenter Karjoth; Matthias Schunter; E. Van Herreweghen
Enterprises advertise privacy promises using the W3C Platform for Privacy Preferences (P3P). These privacy promises define what recipients can obtain what collected data for what purpose. Internally, enterprises can use fine-grained privacy practices such as defined by the Platform for Enterprise Privacy Practices (E-P3P) to enforce privacy. These internal privacy policies should guarantee and enforce the promises made to the customers. Since privacy practices reflect business internals, they can change frequently. As a consequence, it can be challenging to keep the promises up-to-date with the actual practices. To enable up-to-date privacy promises, we describe a methodology for enterprises to promise what they can keep. This is done by automatically transforming E-P3P privacy practices into corresponding P3P privacy promises that reflect the actual enterprise-internal behavior. These P3P promises can then be published on a regular basis. Whenever the internal policies change, the P3P promises can easily be updated as well.
ieee computer security foundations symposium | 2000
Guenter Karjoth
Java 2 Security enhanced with the Java Authentication and Authorization Service (JAAS) provide sophisticated access control features via a user-configurable authorization policy. Fine-grained access control, code-based as well as user-based authorization, and implicit access rights allow the implementation of real-world policies, but of the cost of increased complexity. We provide a formal specification of the Java 2 and JAAS access control model that helps remove ambiguities of the informal definitions. It defines Java 2 access control in terms of an abstract machine, whose behavior is determined by a small set of transition rules. We illustrate the power of Java 2 access control by showing how commonly encountered authorization requirements can be implemented in Java 2.
international conference on data mining | 2013
Aris Gkoulalas-Divanis; Grigorios Loukides; Charu C. Aggarwal; Raghav Bhaskar; Daniel Kifer; Srivatsan Laxman; Xintao Wu; Francesco Bonchi; Maria Luisa Damiani; Josep Domingo-Ferrer; Benjamin C. M. Fung; Wei Jiang; Murat Kantarcioglu; Guenter Karjoth; Panagiotis Karras; Bradley Malin; Kun Liu; Mehmet Sayal; Jianhua Shao; Lisa Singh; Spiros Skiadopoulos; Aleksandra Slavkovic; Adam D. Smith; Manolis Terrovitis; Philip S. Yu; Ke Wang
Introduction Machine learning and data mining algorithms have penetrated our everyday lives and play a central role in many application domains, including social networks, healthcare, location-based systems, and advertising. At the same time, 90\% of todays data have been produced in the last two years! These data come from social networking sites, mobile phone applications, electronic medical record systems, ecommerce sites, and open data portals. The analysis of this wealth of data can lead to valuable insights that will benefit data recipients and the society at large, but may also lead to serious privacy breaches, unless privacy-enhancing technologies are in place.
Archive | 2000
Guenter Karjoth; Luke James O'Connor
Archive | 2001
Steven B. Adler; Endre Bangerter; Nigel Howard Julian Brown; Jan Camenisch; Arthur M. Gilbert; Guenter Karjoth; Dogan Kesdogan; Michael Robert McCullough; Adam Charles Nelson; Charles C. Palmer; Martin J. C. Presler-Marshall; Michael Schnyder; Elsie A. Van Herreweghen; Michael Waidner
Archive | 2012
Thomas Gross; Guenter Karjoth
Archive | 2007
Paul Andrew Moskowitz; Robert J. Von Gutfeld; Guenter Karjoth
Archive | 2003
Linda N. Betz; John C. Dayka; Walter B. Farrell; Richard H. Guski; Guenter Karjoth; Mark A. Nelson; Birgit Pfitzmann; Matthias Schunter; Michael Waidner
Archive | 2008
Guenter Karjoth; Elsie A. Van Herreweghen
Archive | 2003
Stefan G. Hild; Carl Binding; François Dolivo; Guenter Karjoth; Douglas Dykeman; Erich Ruetsche