o Finally, the prohibited paragraph is
intersected with the prohibiting directive.
Here intersection means that all values of the
paragraph are adjusted to match the intervals
in the directive. The strategy may try to
approximate the values of the
counterproposal to the prefered boundary of
the interval.
o If the strategy has still not found an
appropriate intersection, the prohibited
paragraph has to be rejected without a
replacement.
o This process is repeated for every prohibited
paragraph of the unaccepted policy.
• Last step is to create a counterproposal
containing all changed and newly generated
paragraphs. All paragraphs, that were not listed
or explicitly rejected in counterproposal are
supposed to be accepted.
• The created counterproposal is passed to the
PrivAd client that sends it to the opponent.
6 SUMMARY & OUTLOOK
This article determined the situation in stating and
contracting privacy in the Internet. Lacking
negotiation capability has been identified as a
shortcoming. A privacy negotiation framework that
allows mobile users and service providers to
negotiate about data and its potential recipients,
purpose etc. was presented. This framework PrivAd
is downwards compatible with P3P and enables
negotiation scenarios between PrivAd clients and
static servers as well as between known P3P tools
and PrivAd servers. The process of evaluating a
privacy policy and the calculation of
counterproposals was explained. Tests, done with a
state of the art mobile device, prove that our mobile
PrivAd client is functional. Successful negotiations,
finishing with a mutually signed privacy contract,
take about 2 seconds via wireless link and about 0.3
seconds via a wired link, including all message
transfer. In the future the two negotiation parties and
their types of requirements shall be merged, in order
to create tools which can perform both sides of
negotiation at a time. This will enable negotiations
between enterprises and in the peer-to-peer domain.
REFERENCES
Bennicke, Langendörfer, 2003. Towards Automatic
Negotiation of Privacy Contracts for Internet Services.
Proceedings of 11th IEEE Conference on Computer
Networks, IEEE Society Press.
Cranor, 2000. Beyond Concern: Under-standing Net
Users' Attitudes About Online Privacy. Ingo
Vogelsang and Benjamin M. Compaine, eds. The
Internet Upheaval: Raising Questions, Seeking
Answers in Communications Policy. Cambridge,
Massachusetts: The MIT Press, p. 47-70.
Cranor, Langheinrich, 2002. A P3P Preference Exchange
Language 1.0. http://www.w3.org/TR/P3P-
preferences/.
Cranor, Langheinrich, Marchiori M., 2006. The Platform
for Privacy Preferences 1.1 (P3P1.1) Specification.
http://www.w3.org/TR/P3P11/.
CrEme, 2004. CrEme version 3.25, NSICOM,
www.nsicom.com.
Druecke, 2006. Attitudes to Privacy at using mobile
phones (in german), Technical Report, "Mobile
Internet Business", Nr. 3, ISSN 1861-3926.
El-Khatib, 2003. A Privacy Negotiation Protocol for Web
Services, Workshop on Collaboration Agents;
Autonomous Agents for Collaborative Environments
Halifax, Nova Scotia, Canada.
Langheinrich, 2002. A Privacy Awareness System for
Ubiquitous Computing Environments. In: Gaetano
Borriello, Lars Erik Holmquist (Eds.): 4th
International Conference on Ubiquitous Computing
(Ubicomp 2002), LNCS No. 2498, Springer-Verlag,
pp. 237-245.
Maaser, Langendoerfer, 2005. Automated Negotiation of
Privacy Contracts 29
th
Annual International Computer
Software and Applications Conference (COMPSAC
2005). Edinburgh, Scotland, UK. IEEE Computer
Society
Maaser, Ortmann, Langendoerfer, 2006. NEPP:
Negotiation Enhancements for Privacy Policies, W3C
Workshop on Languages for Privacy Policy
Negotiation and Semantics-Driven Enforcement.
Ispra, Italy.
Preibusch, 2005. Implementing Privacy Negotiation
Techniques in E-Commerce, 7
th
IEEE International
Conference on E-Commerce Technology, IEEE CEC
2005, Technische Universität München, Germany
Privacy Bird, 2006. AT&T Corporation,
http://privacybird.com.
Thibadeau, 2000. A Critique of P3P: Privacy on the Web.
The eCommerce Institute, School of Computer
Science, Carnegie Mellon University
Tomcat, 2005. Tomcat version 5.5, Apache Software
Foundation, tomcat.apache.org.
Yee, Korba, 2004. Privacy Policies and their Negotiation
in Distance Education. Instructional Technologies:
Cognitive Aspects of Online Programs. Idea Group
Inc. NRC 46555.
THE PRIVACY ADVOCATE (PRIVAD) - A Framework for Negotiating Individual Privacy Contracts
95