LEGAL PROTECTION OF PRIVACY DATA THROUGH ENCRYPTION TECHNOLOGY
نویسندگان
چکیده
منابع مشابه
Privacy Protection for Dynamic Data through Anonymization
Most of the existing privacy-preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are continuous, transient, and usually unbounded. Moreover, in streaming applications, there is a need to offer strong guarantees on the maximum allowed delay between incoming data and the corresponding anonymized output. To ...
متن کاملLocation Privacy Protection Through Obfuscation
Introduction. Technical improvements of detection and transmission of location information, together with the widespread adoption of mobile communication devices and location-based services for business, social or informational purposes, are increasing the privacy concerns. Better, more elaborated solutions are necessary to provide users (Rule Makers, as they are called in geopriv) the possibil...
متن کاملEnhancing information lookup privacy through homomorphic encryption
Revealing one’s interests in communication has been recognized as a growing problem in the Internet. We postulate that it is desirable for future information retrieval systems to provide privacy in both what information is requested and what information is received, without raising obstacles to the deployment of accounting and access control mechanisms. This paper outlines a solution that fulfi...
متن کاملPrivacy - DRM : Data Protection by Copy Protection ?
Protecting media contents and enforcing privacy policies seem to be related problems: mechanisms are needed to restrict data processing outside the copyright holder’s, respectively data subject’s, domain of control. A systematic analysis of requirements, properties, and experiences with digital rights management (DRM) reveals substantial differences between Content-DRM to protect media contents...
متن کاملPrivacy Protection Via Technology: Platform for Privacy Preferences (P3P)
Increasingly, the Internet is used as a common tool for communication, information gathering, and online transactions. Information privacy is threatened as users are expected to reveal personal information without knowing the consequences of sharing their information. To that end, research groups, both from academia and industry, have embarked on the development of privacy enhancement technolog...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lampung Journal of International Law
سال: 2020
ISSN: 2723-2603,2656-6532
DOI: 10.25041/lajil.v1i2.2027