نتایج جستجو برای: ouafi phan privacy model
تعداد نتایج: 2140727 فیلتر نتایج به سال:
We provide a formal model for identification schemes. Under this model, we give strong definitions for security and privacy. Our model captures the notion of a powerful adversary who can monitor all communications, trace tags within a limited period of time, corrupt tags, and get side channel information on the reader output. Adversaries who do not have access to this side channel are called na...
Privacy policies, laws, and guidelines have been cultivated based on overly verbose specifications. This article claims that privacy regulations lend themselves to a firmer language based on a model of flow of personal identifiable information. The model specifies a limited number of situations and acts on personal identifiable information. As an application of the model, the model is applied t...
Retail industry poses typical enterprise computing challenges, since a retailer normally deals with multiple parties that belong to different organizations (i.e., suppliers, manufacturers, distributors, end consumers). Capable of enabling retailers to effectively and efficiently manage merchandise transferring among various parties, Radio Frequency Identification (RFID) is an emerging technolog...
Privacy has been acknowledged to be a critical concern for many collaborative business environments. Recently, verifying whether Web services composition satisfies privacy requirement is a hot spot for privacy protection. However, little research focuses on behavioral privacy requirement. This paper proposes an approach based on model checking to verify the satisfiability of behavior-aware priv...
Privacy Preserving Data Mining (PPDM) algorithms attempt to reduce the injuries to privacy caused by malicious parties during the rule mining process. Usually, these algorithms are designed for the semi-honest model, where participants do not deviate from the protocol. However, in the real-world, malicious parties may attempt to obtain the secret values of other parties by probing attacks or co...
Although large-scale comparisons of privacy practices acrossan industry have the potential to illuminate the state ofconsumer privacy and to uncover egregious practices, thefreeform legalese of most privacy policies makes comparisonstime-consuming and expensive. Financial institutions in theUnited States are required by the Gramm-Leach-Bliley Actto provide annual privacy...
In a discrete-time linear multi-agent control system, where the agents are coupled via an environmental state, knowledge of the environmental state is desirable to control the agents locally. However, since the environmental state depends on the behavior of the agents, sharing it directly among these agents jeopardizes the privacy of the agents’ profiles, defined as the combination of the agent...
Privacy technologies are becoming more relevant, because individual privacy is at risk in the Global Information Society. In this paper, an updated version of a formal task-based privacy-model which can be used to technically enforce legal privacy requirements is presented. It is shown, how the privacy policy has been specified and implemented according to the Generalized Framework for Access C...
A vital requirement for e-commerce today is privacy. We explore the area of privacy for Agents in the Privacy Incorporated Software Agent (PISA) project. We first review existing privacy protection techniques: pseudonym systems, privacy enhancing technology (PET) and anonymous communication networks. We then propose a model for an Anonymous Internet Infrastructure (AII), an anonymous Internet b...
Most existing location privacy solutions suffer from being binary privacy or constrained to either identity, temporal, or spatial data. Furthermore, solutions which try to embrace location privacy more generally suffer from being overly complex. This limits the expressiveness and general applicability of such solutions, the consequence being that different location privacy implementations are r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید