Showing 1 - 10 of 36
This paper presents a study of obfuscation practices in location-sharing systems. The study shows that users have relatively complex preferences that depend on the recipient of the location, the time of the request and location. The preferences also require multiple levels of obfuscation...
Persistent link: https://www.econbiz.de/10009441299
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the extent that these concerns are adequately...
Persistent link: https://www.econbiz.de/10009441055
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the extent that these concerns are adequately...
Persistent link: https://www.econbiz.de/10009441201
Social networking sites such as Facebook and MySpace thrive on the exchange of personal content such as pictures and activities. These sites are discovering that people's privacy preferences are very rich and diverse. In theory, providing users with more expressive settings to spec- ify their...
Persistent link: https://www.econbiz.de/10009441209
Persistent link: https://www.econbiz.de/10003958238
Persistent link: https://www.econbiz.de/10003958256
Persistent link: https://www.econbiz.de/10003596829
Persistent link: https://www.econbiz.de/10009897841
Persistent link: https://www.econbiz.de/10009897843
A proper security architecture is an essential part of implementing robust and reliable networked applications. Security patterns have shown how reoccurring problems can be best solved with proven solutions. However, while they are critical for ensuring the confidentiality, integrity and...
Persistent link: https://www.econbiz.de/10009441305