Results 1 - 10
of
918
A roadmap for privacy-enhanced secure data provenance
"... Abstract The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the historical pattern of introducing new technologies with the expectation that security and privacy can be added later. Despite very ..."
Abstract
- Add to MetaCart
that our society can gain maximum benefit from this technology. In this paper, we discuss a framework of theoretical foundations, models, mechanisms and architectures that allow applications to benefit from privacy-enhanced and secure use of provenance in a modular fashion. After introducing the main
Tor: The secondgeneration onion router,”
- in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract
-
Cited by 1229 (33 self)
- Add to MetaCart
to support most TCP-based programs without modification. Tor now relies on the filtering features of privacy-enhancing application-level proxies such as Privoxy No mixing, padding, or traffic shaping (yet): Onion Routing originally called for batching and reordering cells as they arrived, assumed padding
Privacy-Enhanced Transactions for Virtual
"... Virtual Organisations (VOs) that overcome the limitations of physical organisations are anticipated to play a vital role in facilitating large scale resource sharing and dynamic collaboration. The privacy of a VO’s members is one of the major concerns, which may hinder the advance of this promising ..."
Abstract
- Add to MetaCart
technology. This paper focuses on a privacy issue that arises when users send security-sensitive data (e.g., the content contains trade secrets or secret formula) to remote servers for data processing. We examine this issue, explore some partial solutions and present an overview of our current work
Privacy-Enhancing Identity Management
"... Issue: Individual privacy is an increasingly important issue in the context of the information society. Privacy-enhancing identity management (IM) offers a means whereby individuals controls the nature and amount of personal information about them that is disclosed. In particular, to achieve privacy ..."
Abstract
- Add to MetaCart
privacy, individuals can use pseudonyms and determine the degree of linkability between different occurrences of their data. Through the secure and authenticated use of pseudonyms, accountability of an individual for his or her actions can be achieved without giving away personal data. Thus, privacy-enhancing
Privacy-enhanced Filtering and Collection Middleware in EPCglobal Networks
"... Abstract—Collection and distribution of Radio Frequency IDentification (RFID) data are subject to various privacy concerns. These concerns are of paramount importance when sensitive data are processed (e.g., medical data). Therefore, it is crucial to treat sensitive data privacy in early stages to m ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
of privacy protection. Current EPCglobal standards for RFID also suffer from insufficient attention to this issue. In this paper, we propose a privacy controller module that enhances the Filtering and Collection (F&C) middleware of the EPCglobal network. We provide a privacy policy-driven model, using
Proceedings of the CHI2006 Workshop on Privacy-Enhanced Personalization
, 2006
"... It has been tacitly acknowledged for many years that personalized interaction and user modeling bear significant implications on privacy, due to the fact that personal information about users needs to be collected to perform personalization. [11] was arguably the first to discuss this problem in a 1 ..."
Abstract
- Add to MetaCart
to stand-alone machines or local networks, people's profiles are now being collected by dozens if not hundreds of personalized websites. Widely publicized security glitches and privacy breaches as well as aggressive telemarketing have led to a wide-spread (~60-80%) reluctance of Internet users
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation
"... Abstract. Participatory sensing enables new paradigms and markets for information collection based on the ubiquitous availability of smartphones, but also introduces privacy challenges for participating users and their data. In this work, we review existing security models for privacy-preserving par ..."
Abstract
- Add to MetaCart
Abstract. Participatory sensing enables new paradigms and markets for information collection based on the ubiquitous availability of smartphones, but also introduces privacy challenges for participating users and their data. In this work, we review existing security models for privacy
Short Paper: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure ABSTRACT
"... Participatory Sensing combines the ubiquity of mobile phones with the sensing capabilities of Wireless Sensor Networks. It targets the pervasive collection of information, e.g., temperature, traffic conditions, or medical data. Users produce measurements from their mobile devices, thus, a number of ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
. In this paper, we introduce PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure. We explore realistic architectural assumptions and a minimal set of formal requirements aiming at protecting privacy of both data producers and consumers. We also present an instantiation that attains privacy guarantees
Assessing the impact of Privacy-Enhancing Technologies for RFID Page 10
- Soft Blocking: Flexible Blocker Tags on the Cheap,” Proceedings of the 2004 ACM workshop on Privacy in the electronic society, ACM
, 2004
"... The perpetual debate on RFID as a risk to privacy has lead to a variety of technical proposals for securing RFID data and encompasses, apart from general IT security measures, a number of RFID-specific “Privacy-Enhancing Technologies (PETs)”. Against the background of an imminent obligation to inclu ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The perpetual debate on RFID as a risk to privacy has lead to a variety of technical proposals for securing RFID data and encompasses, apart from general IT security measures, a number of RFID-specific “Privacy-Enhancing Technologies (PETs)”. Against the background of an imminent obligation
A Privacy-Enhancing e-Business Model Based on Infomediaries
"... Abstract. Rapid evolution of Internet may largely depend on gaining and maintaining the trust of users. This possibility may especially rule enterprises, whose financial viability depends on electronic commerce. Neither customers will have the time, the ability or the endurance to work out the best ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
information exchanged via Internet, while at the same time protecting their privacy. There is a scale between security and privacy that currently leans towards security; security adopts strong user authentication mechanisms in order to control access to personal data, while privacy requires loose
Results 1 - 10
of
918