Showing 1 - 10 of 9,458
still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy …, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy … database. We assess the privacy risk by taking into account both the entity identification and the sensitivity of the disclosed …
Persistent link: https://www.econbiz.de/10009430800
privacy. Previous research efforts acknowledged the importance of assessing location data trustworthiness, but they assume … fact that repositories of personal location data must conform to privacy regulations.In this paper, we study the …, can benefit from the use of anonymized location data. We have implemented a prototype of the proposed privacy …
Persistent link: https://www.econbiz.de/10009483166
this paper we develop an approach to support privacy controlled sharing of identity attributes and harmonization of privacy … of identity attributes from one entity to another violate the privacy policies stated by the former. We also provide …Digital identity is defined as the digital representation of the information known about a specific individual or …
Persistent link: https://www.econbiz.de/10009430312
resulting privacy risk. We relate our framework with the k-anonymity disclosure method; we make the assumptions behind k …
Persistent link: https://www.econbiz.de/10009430348
In this paper we highlight the need for privacy of user data used in digital identity management systems. We … problem of identity theft and the sociological concerns of individuals with respect to the privacy of their identity data. We … show the privacy concerns, especially with respect to health and biometric data, where the loss of privacy of that data may …
Persistent link: https://www.econbiz.de/10009430550
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de/10009430789
In recent years, anonymization methods have emerged as an important tool to preserve individual privacy when releasing … privacy sensitive data sets. This interest in anonymization techniques has resulted in a plethora of methods for anonymizing … data under different privacy and utility assumptions. At the same time, there has been little research addressing how to …
Persistent link: https://www.econbiz.de/10009430287
addressing security concerns, such as access control, security and privacy policies, and the development of secure and in … unique requirements of secure geospatial data management and to suggest a comprehensive framework for security and privacy … for geospatial data and GIS. Such a framework is the first coherent architectural approach to the problem of security and …
Persistent link: https://www.econbiz.de/10009430288
The expanding use of location-based services has profound implications on the privacy of personal information. If no … or organizations, thus resulting in privacy breaches. In this paper, we propose a framework for preserving location … privacy in moving-object environments. Our approach is based on the idea of sending to the service provider suitably modified …
Persistent link: https://www.econbiz.de/10009430799
been proposed, none of them fully address the problem of privacy preservation. Today, privacy is one of the major concerns … address privacy issues in order to be widely applicable. For these reasons, in this paper, we investigate privacy in the … context of trust negotiations. We propose a set of privacy-preserving features for inclusion in any trust negotiation system …
Persistent link: https://www.econbiz.de/10009430846