نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

Journal: :Security and Communication Networks 2015
Hongying Zheng Quan Yuan Jianyong Chen

User’s security and privacy are core issues of network applications. This paper proposes a privacy protection model to evaluate property risk of users, which takes into account both sensitivity of the property and requester’s level of assurance. Furthermore, the sensitivity of the property is evaluated by problem of expectation–maximization algorithm. Experiments show that the optimal size of s...

2017
Lei Yu Ling Liu Calton Pu

Location privacy continues to attract significant attentions in recent years, fueled by the rapid growth of locationbased services (LBSs) and smart mobile devices. Location obfuscation has been the dominating location privacy preserving approach, which transforms the exact location of a mobile user to a perturbed location before its public release. The notion of location privacy has evolved fro...

2009
Xice Sun Wei Lou Junchao Ma Zhi Wang

As important as other security issues, the contextual privacy problem is notable but not thoroughly addressed in distributed networking systems, such as Wireless Sensor Networks(WSNs). An adversary can launch contextual privacy attacks via assigning the linking probability of users’ identities and target messages during data transmissions, to further acquire the sensitive relationship informati...

2009
Priyanka Desai Noushin Ashrafi Jean-Pierre Kuilboer William Koehler

In today’s global economy, the flow of information is essential for the growth of international commerce and for the cross border access for both B2B and B2C services. The e-commerce phenomenon has elevated the privacy issue to a global platform. This paper examines the extent to which sample firms in four European countries post privacy notices on their websites. While posted privacy policy do...

2011
Pritam Gundecha Geoffrey Barbier Huan Liu

Social media gives users an efficient way to communicate and network with each other on an unprecedented scale and at rates unseen in traditional media. As his social network expands, a user’s privacy protection goes beyond his privacy setting and becomes a social networking problem. In this research, we aim to address some critical issues related to privacy protection: Would the highest privac...

Journal: :CoRR 2017
David Harborth Dominik Herrmann Stefan Köpsell Sebastian Pape Christian Roth Hannes Federrath Dogan Kesdogan Kai Rannenberg

The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an improved overlay network-based protection and a concept for privacy protection in the emerging 5G mobile network. A crucial success factor will be the...

Journal: :Int. J. Fuzzy Logic and Intelligent Systems 2012
Yong-Nyuo Shin

As the Privacy Act is in force in Korea, the subject of protection responsibility is increased, and continuous efforts are made to protect privacy in overseas countries, as can be seen by standard drafts related to privacy protection. However, the reality is that a formal privacy manual or guidelines are insufficient to help cope with the rapid changes and privacy leak caused by TGIF(Twitter-Go...

2017
Priti Jagwani Saroj Kaushik

The increasing capabilities of position determination technologies (e.g., GPS) in mobile and hand held device facilitates the widespread use of Location Based Services (LBS). Although LBSs are providing enhanced func‐ tionalities and convenience of ubiquitous computing, they open up new vulnerabilities that can be exploited to target violation of security and privacy of users. For these applica...

2015
Xiaoen Ju Kang G. Shin

The ever-increasing popularity of location-based services (LBSs) poses a serious threat to users’ location privacy. Numerous efforts have been made to protect users’ location privacy and also to limit the degradation of service quality resulting from the additional protection layer. Most existing work, however, relies on a trusted anonymization server, which can itself become one source of untr...

2014
Neha Khatri Satwinder Singh

Neha Khatri Department of Computer Science, CBS Group of Institutions, Jhajjar Delhi-NCR(Haryana), India Dr. Satwinder Singh Department of Computer Science Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, Punjab, India ______________________________________________________________________________________ Abstract: Data security has consistently been a major issue in information te...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید