نتایج جستجو برای: privacy protection
تعداد نتایج: 218145 فیلتر نتایج به سال:
Tracking is pervasive on the web. Third party trackers acquire user data through information leak from websites, and user browsing history using cookies and device fingerprinting. In response, several privacy protection techniques (e.g. the Ghostery browser extension) have been developed. To the best of our knowledge, our work is the first study that proposes a reliable methodology for privacy ...
Due to demand in online services, universities throughout the world are increasing the content of their Web sites and adding features, such as online applications and e-learning. However, adding online services requires that personal data is kept within computerized systems, thus putting personal private information at risk. Online consumers express concern about the risk of their personal priv...
Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asy...
Define the basic content of people’s privacy information and information privacy right in E-commerce, analyze the creating reasons of the problem about people’s information privacy right in E-commerce, point out some protection measures of people’s information privacy right in E-commerce in four aspects, such as to improve people’s safety awareness, to make good external environment of E-commer...
The protection of privacy is an increasing concern in today’s global infrastructure. Many research efforts have been therefore devoted to the development of privacy protecting technology. In particular, as an important step for helping users to maintain control over the use of their personal information, current access control solutions have to be enriched with the ability of supporting privacy...
The growth of electronic services (e-services) has resulted in large amounts of personal information in the hands of service organizations like banks, insurance companies, and online retailers. This has led to the realization that such information must be protected, not only to comply with privacy regulations but also and more importantly, to attract clients. One important dimension of this goa...
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such approaches the perspective of the data subject is often obscured in favour of meeting technical design requirements. The privacy architecture proposed in this paper is premised upon a view of privacy as unique to each...
With the popularity of location-aware devices (e.g., smart phones), a large number trajectory data were collected. The dataset can be used in many fields including traffic monitoring, market analysis, city management, etc. collection and release will raise serious privacy concerns for users. If users’ is not protected enough, they refuse to share their data. In this paper, new protection method...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید