The Anonymizer Protecting User Privacy on the Web

نویسنده

  • Justin Boyan
چکیده

The employee or politician who wants to protect his or her privacy when viewing sensitive medical information, a competitor’s web site, sexual materials, or a web site catering to a marginalized group (e.g., gay rights, pro-choice or pro-life). The scientist who is asked to anonymously review a colleague’s article submission and wants to gather background materials from the author’s web site. The law-enforcement agent who wants to investigate a web site suspected of criminal activity without revealing that his or her Internet host is, say, fbi.gov. The consumer who wants to prevent marketers from compiling user profiles of his or her browsing, newsreading, shopping, financial and travel interests.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Anonymizer Protecting User

The employee or politician who wants to protect his or her privacy when viewing sensitive medical information, a competitor’s web site, sexual materials, or a web site catering to a marginalized group (e.g., gay rights, pro-choice or pro-life). The scientist who is asked to anonymously review a colleague’s article submission and wants to gather background materials from the author’s web site. T...

متن کامل

A Framework for Private Location-based Queries using Cryptographic Protocols

An important privacy issue in Location Based Services (LBS) is to hide a user’s identity and location while still providing quality service. A user’s identity can be easily hidden through anonymous web browsing services, however, a user’s location can reveal a user’s identity. For example, if a user at home asks queries such as “Find the nearest hospital around me” to a LBS server, then based o...

متن کامل

Enhancing Web privacy and anonymity in the digital era

This paper presents a state-of-the-art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture, operational principles and vulnerabilities. Furthermore, to facilitate a detailed comparative analysis, the appropriate parameters have been selected and grouped in classes of comparison criteria, in the form of an in...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000