• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 1,881
Next 10 →

PROFITABLE INVESTMENTS MITIGATING PRIVACY RISKS

by John Borking
"... ..."
Abstract - Add to MetaCart
Abstract not found

Managing and Accessing Data in the Cloud: Privacy Risks and Approaches

by Sabrina De, Capitani Vimercati, Sara Foresti, Pierangela Samarati
"... Abstract—Ensuring proper privacy and protection of the information stored, communicated, processed, and disseminated in the cloud as well as of the users accessing such an information is one of the grand challenges of our modern society. As a matter of fact, the advancements in the Information Techn ..."
Abstract - Add to MetaCart
Technology and the diffusion of novel paradigms such as data outsourcing and cloud computing, while allowing users and companies to easily access high quality applications and services, introduce novel privacy risks of improper information disclosure and dissemination. In this paper, we will characterize

Managing and Accessing Data in the Cloud: Privacy Risks and Approaches

by Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati , 2012
"... Ensuring proper privacy and protection of the information stored, communicated, processed, and disseminated in the cloud as well as of the users accessing such an information is one of the grand challenges of our modern society. As a matter of fact, the advancements in the Information Technology an ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
and the diffusion of novel paradigms such as data outsourcing and cloud computing, while allowing users and companies to easily access high quality applications and services, introduce novel privacy risks of improper information disclosure and dissemination. In this paper, we will characterize different aspects

Analytical Tools for Privacy Risks: Assessing Efficacy on Vote Verification Technologies

by Rosa R. Heckle
"... This study examines the two analytical tools—Privacy Impact Assessments and the classic risk analysis model in an effort to understand their utility and efficacy as tools to assess privacy risk, particularly for assessing the privacy risks of vote verification technologies. Our findings suggest that ..."
Abstract - Add to MetaCart
This study examines the two analytical tools—Privacy Impact Assessments and the classic risk analysis model in an effort to understand their utility and efficacy as tools to assess privacy risk, particularly for assessing the privacy risks of vote verification technologies. Our findings suggest

EVALUATION OF THE PRIVACY RISK FOR ONLINE SEARCH AND SOCIAL TAGGING SYSTEMS

by Estudis Máster, Ingeniería Telemática, Autor Ana Fern, A Rodríguez Hoyos, Forné Muñoz, Co-director Javier, Parra Arnau
"... 3 [Evaluation of Privacy Risk for Online Search and Social Tagging Systems] Index Index........................................................................................... 3 Index of figures............................................................................ 6 ..."
Abstract - Add to MetaCart
3 [Evaluation of Privacy Risk for Online Search and Social Tagging Systems] Index Index........................................................................................... 3 Index of figures............................................................................ 6

Probabilistic Prediction of Privacy Risks in User Search Histories

by Joanna Biega, Ida Mele, Gerhard Weikum
"... This paper proposes a new model of user-centric, global, probabilistic privacy, geared for today’s challenges of helping users to manage their privacy-sensitive information across a wide variety of social networks, online communities, QA fo-rums, and search histories. Our approach anticipates an adv ..."
Abstract - Add to MetaCart
an adversary that harnesses global background knowledge and rich statistics in order to make educated guesses, that is, probabilistic inferences at sensitive data. We aim for a tool that simulates such a powerful adversary, predicts pri-vacy risks, and guides the user. In this paper, our frame

Privacy Risks in Mobile Dating Apps Full Paper

by Jody Farnden, Ben Martini, Kim-kwang Raymond Choo
"... Dating apps for mobile devices, one popular GeoSocial app category, are growing increasingly popular. These apps encourage the sharing of more personal information than conventional social media apps, including continuous location data. However, recent high profile incidents have highlighted the pri ..."
Abstract - Add to MetaCart
the privacy risks inherent in using these apps. In this paper, we present a case study utilizing forensic techniques on nine popular proximity-based dating apps in order to determine the types of data that can be recovered from user devices. We recover a number of data types from these apps that raise

Privacy Risk in Anonymized Heterogeneous Information Networks

by Aston Zhang , Xing Xie , Kevin Chen , Chuan Chang , Carl A Gunter , Jiawei Han , Xiaofeng Wang - In Proc. 17th International Conference on Extending Database Technology (EDBT 2014
"... ABSTRACT Anonymized user datasets are often released for research or industry applications. As an example, t.qq.com released its anonymized users' profile, social interaction, and recommendation log data in KDD Cup 2012 to call for recommendation algorithms. Since the entities (users and so on ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
derived from heterogeneity can be used to relax these assumptions. To characterize and demonstrate this added threat, we formally define privacy risk in an anonymized heterogeneous information network to identify the vulnerability in the possible way such data are released, and further present a new de

Location-sharing technologies: Privacy risks and controls

by Janice Y. Tsai, Patrick Gage Kelley, Lorrie Faith Cranor, Norman Sadeh - In Research Conference on Communication, Information and Internet Policy (TPRC , 2009
"... Abstract. Due to the ability of cell phone providers to use cell phone towers to pinpoint users ’ locations, federal E911 requirements, the increasing popularity of GPS-capabilities in cellular phones, and the rise of cellular phones for Internet use, a plethora of new applications have been develop ..."
Abstract - Cited by 39 (8 self) - Add to MetaCart
developed that share users ’ real-time location information online [27]. This paper evaluates users ’ risk and benefit perceptions related to the use of these technologies and the privacy controls of existing location-sharing applications. We conducted an online survey of American Internet users (n = 587

On the privacy risks of publishing anonymized ip network traces

by D Koukis , S Antonatos , K G Anagnostakis - In Proceedings of Communications and Multimedia Security , 2006
"... Abstract. Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of published packet traces implement a form of address anonymization to hide sensitive information, it has been u ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
unclear if such anonymization techniques are sufficient to address the privacy concerns of users and organizations. In this paper we attempt to quantify the risks of publishing anonymized packet traces. In particular, we examine whether statistical identification techniques can be used to uncover
Next 10 →
Results 11 - 20 of 1,881
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University