EnCoRe: Towards a holistic approach to privacy

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News EnCoRe: Towards a holistic approach to privacy
# 1  
Old 07-23-2010
EnCoRe: Towards a holistic approach to privacy

HPL-2010-83 EnCoRe: Towards a holistic approach to privacy - Papanikolaou, Nick; Creese, Sadie; Goldsmith, Michael; Casassa Mont, Marco; Pearson, Siani
Keyword(s): privacy policies, policy hierarchy, policy refinement
Abstract: Privacy requirements for IT systems and solutions arise from a variety of sources, including legislation, sector-specific regulation, organisational guidelines, social and user expectations. In this paper we present and discuss a holistic approach to the management of privacy - explored in the conte ...
Full Report

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

What is the right approach to take?

Hello every one, I will love to know what is the best approach to take in obtaining books online. I find it disturbing just googling a book online and downloading it without actually paying for it. I strongly believe that this is wrong and that i may not be able to unlock the key contents and... (2 Replies)
Discussion started by: despiragado
2 Replies

2. Shell Programming and Scripting

Best Approach To Encrypt The Passwords

Hello All, I am using the red hat Linux OS and bash shell scripting. Below is my requirement. I need to store encrypted the passwords of database accounts, ftp acccounts into a file1. Encrypt that file1 or make it secure with password to open & read it. Later in shell scripts I need to... (12 Replies)
Discussion started by: Ariean
12 Replies

3. Red Hat

What would be the best approach?

I have a table in one of my DB. The DB is about 300 gig - of that 249 gig is in this table. The data is somewhat important but even if we delete half of it won't affect anybody. I would like to reclaim some space back so my question is what would be the best approach to accomplish this task.... (6 Replies)
Discussion started by: newborndba
6 Replies

4. Programming

Oracle Procedure approach

HI All , I am new to oracle procedures. Please help me for the approach to satify the requirement. I need to create procedures. with parameters passed ( say report,type,identities,country ) It should also call sql query within the procedures and passed parameters should be used in where clause... (2 Replies)
Discussion started by: Perlbaby
2 Replies

5. Shell Programming and Scripting

Approach on Header record

All, I currently have a requirement to fetch a Date value from a table. And then insert a Header record into a file along with that date value. ex: echo "HDR"" "`date +%Y%j` `date +%Y%m%d` In the above example I used julian date and standard date using Current Date. But the requirement... (0 Replies)
Discussion started by: cmaroju
0 Replies

6. Shell Programming and Scripting

Need advice on approach for script

Greetings all. I have a repository server which receives, without exhaggeration, several million files a week. The majority of these files are in .csv format, which means they're highly compressable. They are spread throughout numerous directories where there are configured monitoring utilities... (4 Replies)
Discussion started by: msarro
4 Replies

7. Homework & Coursework Questions

How to approach Julian date?

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: This function is given the day, month and year and returns the Julian date. The Julian date is the... (1 Reply)
Discussion started by: mgyeah
1 Replies

8. Programming

How to evaluate which coding approach is best?

Let's say for example that we have two different ways was can code the exact same program to achieve the same result. What is the best way to determine which of the two methods is the best solution? Is it as simple as basing it on how long the program takes to run or is there a more... (4 Replies)
Discussion started by: jmvbxx
4 Replies
Login or Register to Ask a Question
rpc_gss_set_defaults(3N)												  rpc_gss_set_defaults(3N)

NAME
rpc_gss_set_defaults - change service, QOP for a session SYNOPSIS
DESCRIPTION
allows an application to change the service (privacy, integrity, authentication, or none) and Quality of Protection (QOP) for a transfer session. New values apply to the rest of the session only unless they are changed again. PARAMETERS
Information on data types for parameters may be found on the rpcsec_gss(3N) manpage. auth An RPC authentication handle returned by service An of type representing one of the following types of security service: authentication, privacy, integrity, or none. qop A string representing Quality of Protection. Valid strings may be found in the file or by using MULTITHREAD USAGE
Thread Safe: Yes Cancel Safe: Yes Fork Safe: No Async-cancel Safe: No Async-signal Safe: No These functions can be called safely in a multithreaded environment. They may be cancellation points in that they call functions that are cancel points. In a multithreaded environment, these functions are not safe to be called by a child process after and before These functions should not be called by a multithreaded application that supports asynchronous cancellation or asynchronous signals. RETURN VALUES
returns if it is successful; otherwise, use to get the error associated with the failure. FILES
File containing valid QOP values SEE ALSO
rpc(3N), rpc_gss_get_mech_info(3N), rpcsec_gss(3N), qop(4). ONC+ Developer's Guide Network Working Group RFC 2078 rpc_gss_set_defaults(3N)