Showing 91 - 100 of 14,530
mšglich sind. Die BeitrŠge dieser Dissertation sind im Einzelnen: - Wir untersuchen die Eignung sog. Privacy … an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When … discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions …
Persistent link: https://www.econbiz.de/10009467071
range of different information sources. In more sensitive application areas however, the privacy of the data holders can be … of detail, patients are only willing to provide data when their privacy is guaranteed. This conflict of interest between … with a solution that is satisfactory to both. The specific contributions of this thesis are the following: - Privacy …
Persistent link: https://www.econbiz.de/10009467121
considerable efforts to address these concerns, which include privacy and data protection issues, information security and personal … of ubiquitous computing applications and specifically to attack privacy and security issues. Inspired by the principle, I … computing applications and to translate security and privacy concerns into research questions in the design process. I further …
Persistent link: https://www.econbiz.de/10009475965
implications for individual privacy. While social networks allow users to restrict access to their personal data, there is … currently no mechanism to enforce privacy concerns over content uploaded by other users. As group photos and stories are shared … by friends and family, personal privacy goes beyond the discretion of what a user uploads about himself and becomes an …
Persistent link: https://www.econbiz.de/10009477767
the widespread use of LBS. The outcome of this paper is the development of an LBS privacy-security dichotomy. The … dichotomy demonstrates the importance of striking a balance between the privacy of the individual and national security as a …
Persistent link: https://www.econbiz.de/10009457430
privacy. Previous research efforts acknowledged the importance of assessing location data trustworthiness, but they assume … fact that repositories of personal location data must conform to privacy regulations.In this paper, we study the …, can benefit from the use of anonymized location data. We have implemented a prototype of the proposed privacy …
Persistent link: https://www.econbiz.de/10009483166
healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy … concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However …, providing solutions to the security and privacy threats has been a challenge due to extremely inadequate resources of typical …
Persistent link: https://www.econbiz.de/10009484555
irrespective of time and place. Private retail sales portals offer the convenience for the busy Malaysian urban consumers to shop …
Persistent link: https://www.econbiz.de/10009485722
organization. An emerging approach for protecting identities of individuals while at the same time enhancing user convenience is to … this paper we develop an approach to support privacy controlled sharing of identity attributes and harmonization of privacy … of identity attributes from one entity to another violate the privacy policies stated by the former. We also provide …
Persistent link: https://www.econbiz.de/10009430312
resulting privacy risk. We relate our framework with the k-anonymity disclosure method; we make the assumptions behind k …
Persistent link: https://www.econbiz.de/10009430348