Privacy-aware electronic society
نویسندگان
چکیده
منابع مشابه
Privacy in the Electronic Society
In today’s systems, the protection of privacy is an increasing concern. Users are often required to provide a vast amount of information about themselves on which the restrictions to be enforced may come from different input requirements, possibly under the control of different authorities. In addition, users have often little control over their personal information once it has been disclosed t...
متن کاملProtecting Information Privacy in the Electronic Society
The privacy of users, the confidentiality of organizations, and the protection of huge collections of sensitive information, possibly related to data that might be released publicly or semi-publicly for various purposes, are essential requirements for the today’s Electronic Society. In this chapter, we discuss the main privacy concerns that arise when releasing information to third parties. In ...
متن کاملPrivacy in the Electronic Society: Emerging Problems and Solutions *
As the global information infrastructure is becoming more ubiquitous, digital business transactions are increasingly performed using a variety of mobile devices and across multiple communication channels. This new service-oriented paradigm is making the protection of privacy an increasing concern, as it relies on rich context representations (e.g., of location and purpose) and requires users to...
متن کاملPrivacy-aware location privacy preference recommendations
Location-Based Services have become increasingly popular due to the prevalence of smart devices and location-sharing applications such as Facebook and Foursquare. The protection of people’s sensitive location data in such applications is an important requirement. Conventional location privacy protection methods, however, such as manually defining privacy rules or asking users to make decisions ...
متن کاملPrivacy-Aware Workflow Management
Information security policies play an important role in achieving information security. Confidentiality, Integrity, and Availability are classic information security goals attained by enforcing appropriate security policies. Workflow Management Systems (WfMSs) also benefit from inclusion of these policies to maintain the security of business-critical data. However, in typical WfMSs these polici...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: annals of telecommunications - annales des télécommunications
سال: 2013
ISSN: 0003-4347,1958-9395
DOI: 10.1007/s12243-013-0405-4