Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Robert Thyne is active.

Publication


Featured researches published by Robert Thyne.


Journal of Computer Security | 2008

Privacy policy enforcement in enterprises with identity management solutions

Marco Casassa Mont; Robert Thyne

People are usually asked by enterprises to disclose their personal information to access web services and engage in business interactions. Enterprises need this information to enable their business processes. This is unlikely to change, at least in the foreseeable future. When collecting personal data, enterprises must satisfy privacy laws and policies along with addressing peoples expectations on how their data should be handled. Currently much is done by means of manual processes, in particular in terms of privacy enforcement: these processes are prone to mistakes and hard to comply with. Automation can help enterprises to deal with these privacy management issues, in particular the enforcement of privacy policies on collected personal data. Enterprises have already been investing in identity management solutions: they require that approaches to automate privacy management should keep into account and leverage these solutions. This paper discusses our research and development work to automate the enforcement of privacy policies in enterprises. Our model of privacy policy enforcement is introduced along with the technical details of a related prototype, integrated (as a proof of concept) with HP Select Access, a state-of-the-art identity management solution. This technology is currently under productisation. We discuss our current results and next steps.


trust and privacy in digital business | 2006

A systematic approach to privacy enforcement and policy compliance checking in enterprises

Marco Casassa Mont; Siani Pearson; Robert Thyne

Privacy management is important for enterprises that handle personal data: they must deal with privacy laws and people’s expectations. Currently much is done by means of manual processes, which make them difficult and expensive to comply. Key enterprises’ requirements include: automation, simplification, cost reduction and leveraging of current identity management solutions. This paper describes a suite of privacy technologies that have been developed by HP Labs, in an integrated way, to help enterprises to automate the management and enforcement of privacy policies (including privacy obligations) and the process of checking that such policies and legislation are indeed complied with. Working prototypes have been implemented to demonstrate the feasibility of our approach. In particular, as a proof-of-concept, the enforcement of privacy policies and obligations has been integrated with HP identity management solutions. Part of this technology is currently under productisation. Technical details are provided along with a description of our next steps.


Lecture Notes in Computer Science | 2006

A systemic approach to automate privacy policy enforcement in enterprises

Marco Casassa Mont; Robert Thyne


Archive | 2005

Privacy Enforcement with HP Select Access for Regulatory Compliance

Marco Casassa Mont; Robert Thyne; Pete Brmhall


trust and privacy in digital business | 2005

Privacy enforcement for IT governance in enterprises: doing it for real

Marco Casassa Mont; Robert Thyne; Pete Bramhall


Lecture Notes in Computer Science | 2005

Privacy enforcement for IT governance in enterprises : Doing it for real

Marco Casassa Mont; Robert Thyne; Pete Bramhall


Archive | 2011

Transitive closure security

Yu Gong; Robert Thyne


Archive | 2005

Privacy Policy Enforcement in Enterprises: Addressing Regulatory Compliance and Governance Needs

Marco Casassa Mont; Robert Thyne; Pete Bramhall; Kwok-Nga Chan

Collaboration


Dive into the Robert Thyne's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge