نتایج جستجو برای: phan privacy model
تعداد نتایج: 2140719 فیلتر نتایج به سال:
Privacy has been acknowledged to be a critical concern for many collaborative business environments. Recently, verifying whether Web services composition satisfies privacy requirement is a hot spot for privacy protection. However, little research focuses on behavioral privacy requirement. This paper proposes an approach based on model checking to verify the satisfiability of behavior-aware priv...
Privacy Preserving Data Mining (PPDM) algorithms attempt to reduce the injuries to privacy caused by malicious parties during the rule mining process. Usually, these algorithms are designed for the semi-honest model, where participants do not deviate from the protocol. However, in the real-world, malicious parties may attempt to obtain the secret values of other parties by probing attacks or co...
Although large-scale comparisons of privacy practices acrossan industry have the potential to illuminate the state ofconsumer privacy and to uncover egregious practices, thefreeform legalese of most privacy policies makes comparisonstime-consuming and expensive. Financial institutions in theUnited States are required by the Gramm-Leach-Bliley Actto provide annual privacy...
In a discrete-time linear multi-agent control system, where the agents are coupled via an environmental state, knowledge of the environmental state is desirable to control the agents locally. However, since the environmental state depends on the behavior of the agents, sharing it directly among these agents jeopardizes the privacy of the agents’ profiles, defined as the combination of the agent...
Privacy technologies are becoming more relevant, because individual privacy is at risk in the Global Information Society. In this paper, an updated version of a formal task-based privacy-model which can be used to technically enforce legal privacy requirements is presented. It is shown, how the privacy policy has been specified and implemented according to the Generalized Framework for Access C...
A vital requirement for e-commerce today is privacy. We explore the area of privacy for Agents in the Privacy Incorporated Software Agent (PISA) project. We first review existing privacy protection techniques: pseudonym systems, privacy enhancing technology (PET) and anonymous communication networks. We then propose a model for an Anonymous Internet Infrastructure (AII), an anonymous Internet b...
Most existing location privacy solutions suffer from being binary privacy or constrained to either identity, temporal, or spatial data. Furthermore, solutions which try to embrace location privacy more generally suffer from being overly complex. This limits the expressiveness and general applicability of such solutions, the consequence being that different location privacy implementations are r...
Privacy concerns can greatly hinder consumers’ intentions to interact with a website. The success of a website therefore depends on its ability to improve consumers’ perceptions of privacy assurance. Seals and assurance statements are mechanisms often used to increase this assurance; however, the findings of the extant literature regarding the effectiveness of these tools are mixed. We propose ...
Today, vast amounts of location data are collected by various service providers. The location data owners have a good idea of where their customers are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. However, location data owners cannot directly share their data with other businesses, mainly due ...
Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website know the company selling the product, as well as the name and address of the online customer. To make matters worse, if the same delivery company has contracted with many websites, aggregated information per address may b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید