Showing 1 - 10 of 79
privacy. Previous research efforts acknowledged the importance of assessing location data trustworthiness, but they assume … fact that repositories of personal location data must conform to privacy regulations.In this paper, we study the …, can benefit from the use of anonymized location data. We have implemented a prototype of the proposed privacy …
Persistent link: https://www.econbiz.de/10009483166
this paper we develop an approach to support privacy controlled sharing of identity attributes and harmonization of privacy … of identity attributes from one entity to another violate the privacy policies stated by the former. We also provide … accountability since an entity non-compliant with the users original privacy preferences can be identified. Finally, a comprehensive …
Persistent link: https://www.econbiz.de/10009430312
resulting privacy risk. We relate our framework with the k-anonymity disclosure method; we make the assumptions behind k …
Persistent link: https://www.econbiz.de/10009430348
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
In this paper we highlight the need for privacy of user data used in digital identity management systems. We … problem of identity theft and the sociological concerns of individuals with respect to the privacy of their identity data. We … show the privacy concerns, especially with respect to health and biometric data, where the loss of privacy of that data may …
Persistent link: https://www.econbiz.de/10009430550
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de/10009430789
represent a threat to privacy in that credentials, exchanged during negotiations, often contain sensitive personal information … that may need to be selectively released. In this paper, we address the problem of preserving privacy in trust negotiations …. We introduce the notion of privacy preserving disclosure, that is, a set that does not include attributes or credentials …
Persistent link: https://www.econbiz.de/10009430311
record pairs, reducing the matching cost to acceptable levels. The blocking step is essential for the privacy, accuracy and … sufficient privacy. We propose an alternative design centered on differential privacy, a novel paradigm that provides strong … privacy guarantees. The realization of the new model presents difficult challenges, such as the evaluation of distance …
Persistent link: https://www.econbiz.de/10009430495
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and … representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information … Information Privacy. It has evolved through the study and application for information privacy and its affects on the operation …
Persistent link: https://www.econbiz.de/10009434833
When considering information security and privacy issues most of the attention has previously focused on data … protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of …
Persistent link: https://www.econbiz.de/10009434918