Showing 1 - 10 of 111
still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy …, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy … database. We assess the privacy risk by taking into account both the entity identification and the sensitivity of the disclosed …
Persistent link: https://www.econbiz.de/10009430800
organization. An emerging approach for protecting identities of individuals while at the same time enhancing user convenience is to … this paper we develop an approach to support privacy controlled sharing of identity attributes and harmonization of privacy … of identity attributes from one entity to another violate the privacy policies stated by the former. We also provide …
Persistent link: https://www.econbiz.de/10009430312
resulting privacy risk. We relate our framework with the k-anonymity disclosure method; we make the assumptions behind k …
Persistent link: https://www.econbiz.de/10009430348
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
In this paper we highlight the need for privacy of user data used in digital identity management systems. We … problem of identity theft and the sociological concerns of individuals with respect to the privacy of their identity data. We … show the privacy concerns, especially with respect to health and biometric data, where the loss of privacy of that data may …
Persistent link: https://www.econbiz.de/10009430550
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de/10009430789
before releasing microdata. First, individual's privacy needs to be adequately protected. In general, the data will be … existing privacy goals to better fit the protection requirement of numerical data, and develop a scheme to achieve this privacy … goal through sensitive attribute permutation. Second, we propose a stronger privacy goal where an attacker can only learn …
Persistent link: https://www.econbiz.de/10009431267
the widespread use of LBS. The outcome of this paper is the development of an LBS privacy-security dichotomy. The … dichotomy demonstrates the importance of striking a balance between the privacy of the individual and national security as a …
Persistent link: https://www.econbiz.de/10009457430
implications for individual privacy. While social networks allow users to restrict access to their personal data, there is … currently no mechanism to enforce privacy concerns over content uploaded by other users. As group photos and stories are shared … by friends and family, personal privacy goes beyond the discretion of what a user uploads about himself and becomes an …
Persistent link: https://www.econbiz.de/10009477767
privacy. Previous research efforts acknowledged the importance of assessing location data trustworthiness, but they assume … fact that repositories of personal location data must conform to privacy regulations.In this paper, we study the …, can benefit from the use of anonymized location data. We have implemented a prototype of the proposed privacy …
Persistent link: https://www.econbiz.de/10009483166