Expressive privacy control with pseudonyms
نویسندگان
چکیده
منابع مشابه
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current online social networks by providing complementary services including real-time friend and community detection and localized data sharing without infrastructure requirement. Aft...
متن کاملPrivacy for Distributed Databases via (Un)linkable Pseudonyms
When data maintained in a decentralized fashion needs to be synchronized or exchanged between different databases, related data sets usually get associated with a unique identifier. While this approach facilitates cross-domain data exchange, it also comes with inherent drawbacks in terms of controllability. As data records can easily be linked, no central authority can limit or control the info...
متن کاملSecurity and Privacy in Two RFID Deployments , With New Methods For Private Authentication and RFID Pseudonyms
We study security and privacy in deployments of Radio Frequency Identification (RFID) technology and propose novel mechanisms for improving RFID privacy. In the first part of the thesis, we consider two real deployments of RFID technology: library books and electronic passports. For each deployment, we set out security and privacy issues. Then we analyze existing RFID technology in the context ...
متن کاملOn Transaction Pseudonyms with Implicit Attributes
Transaction pseudonyms with implicit attributes are a novel approach to multilevel linkable transaction pseudonyms. We extend earlier work of Juels and Pappu on reencryption-based transaction pseudonyms, by developing new mechanisms for controlled pseudonym linkability. This includes mechanisms for cooperative, stepwise re-identification as well as individual authentication of pseudonyms. Our p...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGCOMM Computer Communication Review
سال: 2013
ISSN: 0146-4833
DOI: 10.1145/2534169.2486032