Expressive privacy control with pseudonyms

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks

Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current online social networks by providing complementary services including real-time friend and community detection and localized data sharing without infrastructure requirement. Aft...

متن کامل

Privacy for Distributed Databases via (Un)linkable Pseudonyms

When data maintained in a decentralized fashion needs to be synchronized or exchanged between different databases, related data sets usually get associated with a unique identifier. While this approach facilitates cross-domain data exchange, it also comes with inherent drawbacks in terms of controllability. As data records can easily be linked, no central authority can limit or control the info...

متن کامل

Security and Privacy in Two RFID Deployments , With New Methods For Private Authentication and RFID Pseudonyms

We study security and privacy in deployments of Radio Frequency Identification (RFID) technology and propose novel mechanisms for improving RFID privacy. In the first part of the thesis, we consider two real deployments of RFID technology: library books and electronic passports. For each deployment, we set out security and privacy issues. Then we analyze existing RFID technology in the context ...

متن کامل

On Transaction Pseudonyms with Implicit Attributes

Transaction pseudonyms with implicit attributes are a novel approach to multilevel linkable transaction pseudonyms. We extend earlier work of Juels and Pappu on reencryption-based transaction pseudonyms, by developing new mechanisms for controlled pseudonym linkability. This includes mechanisms for cooperative, stepwise re-identification as well as individual authentication of pseudonyms. Our p...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGCOMM Computer Communication Review

سال: 2013

ISSN: 0146-4833

DOI: 10.1145/2534169.2486032