Results 11 - 20
of
1,881
Managing and Accessing Data in the Cloud: Privacy Risks and Approaches
"... Abstract—Ensuring proper privacy and protection of the information stored, communicated, processed, and disseminated in the cloud as well as of the users accessing such an information is one of the grand challenges of our modern society. As a matter of fact, the advancements in the Information Techn ..."
Abstract
- Add to MetaCart
Technology and the diffusion of novel paradigms such as data outsourcing and cloud computing, while allowing users and companies to easily access high quality applications and services, introduce novel privacy risks of improper information disclosure and dissemination. In this paper, we will characterize
Managing and Accessing Data in the Cloud: Privacy Risks and Approaches
, 2012
"... Ensuring proper privacy and protection of the information stored, communicated, processed, and disseminated in the cloud as well as of the users accessing such an information is one of the grand challenges of our modern society. As a matter of fact, the advancements in the Information Technology an ..."
Abstract
-
Cited by 10 (3 self)
- Add to MetaCart
and the diffusion of novel paradigms such as data outsourcing and cloud computing, while allowing users and companies to easily access high quality applications and services, introduce novel privacy risks of improper information disclosure and dissemination. In this paper, we will characterize different aspects
Analytical Tools for Privacy Risks: Assessing Efficacy on Vote Verification Technologies
"... This study examines the two analytical tools—Privacy Impact Assessments and the classic risk analysis model in an effort to understand their utility and efficacy as tools to assess privacy risk, particularly for assessing the privacy risks of vote verification technologies. Our findings suggest that ..."
Abstract
- Add to MetaCart
This study examines the two analytical tools—Privacy Impact Assessments and the classic risk analysis model in an effort to understand their utility and efficacy as tools to assess privacy risk, particularly for assessing the privacy risks of vote verification technologies. Our findings suggest
EVALUATION OF THE PRIVACY RISK FOR ONLINE SEARCH AND SOCIAL TAGGING SYSTEMS
"... 3 [Evaluation of Privacy Risk for Online Search and Social Tagging Systems] Index Index........................................................................................... 3 Index of figures............................................................................ 6 ..."
Abstract
- Add to MetaCart
3 [Evaluation of Privacy Risk for Online Search and Social Tagging Systems] Index Index........................................................................................... 3 Index of figures............................................................................ 6
Probabilistic Prediction of Privacy Risks in User Search Histories
"... This paper proposes a new model of user-centric, global, probabilistic privacy, geared for today’s challenges of helping users to manage their privacy-sensitive information across a wide variety of social networks, online communities, QA fo-rums, and search histories. Our approach anticipates an adv ..."
Abstract
- Add to MetaCart
an adversary that harnesses global background knowledge and rich statistics in order to make educated guesses, that is, probabilistic inferences at sensitive data. We aim for a tool that simulates such a powerful adversary, predicts pri-vacy risks, and guides the user. In this paper, our frame
Privacy Risks in Mobile Dating Apps Full Paper
"... Dating apps for mobile devices, one popular GeoSocial app category, are growing increasingly popular. These apps encourage the sharing of more personal information than conventional social media apps, including continuous location data. However, recent high profile incidents have highlighted the pri ..."
Abstract
- Add to MetaCart
the privacy risks inherent in using these apps. In this paper, we present a case study utilizing forensic techniques on nine popular proximity-based dating apps in order to determine the types of data that can be recovered from user devices. We recover a number of data types from these apps that raise
Privacy Risk in Anonymized Heterogeneous Information Networks
- In Proc. 17th International Conference on Extending Database Technology (EDBT 2014
"... ABSTRACT Anonymized user datasets are often released for research or industry applications. As an example, t.qq.com released its anonymized users' profile, social interaction, and recommendation log data in KDD Cup 2012 to call for recommendation algorithms. Since the entities (users and so on ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
derived from heterogeneity can be used to relax these assumptions. To characterize and demonstrate this added threat, we formally define privacy risk in an anonymized heterogeneous information network to identify the vulnerability in the possible way such data are released, and further present a new de
Location-sharing technologies: Privacy risks and controls
- In Research Conference on Communication, Information and Internet Policy (TPRC
, 2009
"... Abstract. Due to the ability of cell phone providers to use cell phone towers to pinpoint users ’ locations, federal E911 requirements, the increasing popularity of GPS-capabilities in cellular phones, and the rise of cellular phones for Internet use, a plethora of new applications have been develop ..."
Abstract
-
Cited by 39 (8 self)
- Add to MetaCart
developed that share users ’ real-time location information online [27]. This paper evaluates users ’ risk and benefit perceptions related to the use of these technologies and the privacy controls of existing location-sharing applications. We conducted an online survey of American Internet users (n = 587
On the privacy risks of publishing anonymized ip network traces
- In Proceedings of Communications and Multimedia Security
, 2006
"... Abstract. Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of published packet traces implement a form of address anonymization to hide sensitive information, it has been u ..."
Abstract
-
Cited by 22 (0 self)
- Add to MetaCart
unclear if such anonymization techniques are sufficient to address the privacy concerns of users and organizations. In this paper we attempt to quantify the risks of publishing anonymized packet traces. In particular, we examine whether statistical identification techniques can be used to uncover
Results 11 - 20
of
1,881