The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy-preserving routing protocols in wireless networks frequently utilize additional artificial traffic to hide the identities of communicating source-destination pairs. Usually, the addition of artificial traffic is done heuristically with no guarantees that the transmission cost, latency, and so on, are optimized in every network topology. In this paper, we explicitly examine the privacy-utility...
Mobile crowd sensing is an emerging sensing paradigm where sensing applications buy sensor data from mobile smartphone users (workers) instead of deploying their own sensor networks to estimate some statistics of a spatial event. In many spatial monitoring applications, the crowdsourcer needs to incentivize smartphone users to contribute sensing data so that the collected dataset has good spatial...
This paper presents a model for location anonymous area estimation, which establishes the related Bayesian inference network by making full use of the time-varying characteristic of person traffic or vehicle traffic, thus implementing the dynamical estimation method of minimum anonymous area. Integrating the real data, the method makes the prediction, therefore it is more accurate. The model in this...
The development of the Internet and telecommunication urges researchers to look for a better way to secure online users' private information. This study is rooted in online user account protection, measuring the effect of QR codes on fear appeals and authentication protection. This study contributes to the extant literature by integrating two theories — protection motivation theory and the theory...
This paper proposes a framework for privacy preserving access control policies and mechanisms, and describes algorithms for access policy conflicting problems. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is purpose involved access control models (PAC) that provide full support for expressing highly complex privacy-related...
As a new branch of data mining, privacy preserving data mining has become more and more important in the information security field. This paper first presents an insight into the principles of privacy preserving data mining, and then marks out the difference with normal data mining through three stages, including single data record methods, centralized dataset mining technology and secure multiparty...
Since the introduction of numerous IT technologies, formal business cases convince that proper e-HR strategy could lead to cost reductions, improved service and transaction accuracy, etc. However, many difficulties have appeared in the implementation of e-HR. In the relative low level of e-HR, the deficiencies of techniques and skills might be the main barriers in the application of e-HR; during the...
The emergence of location-aware mobile social networking applications (SNAs) has gained considerable prominence in ubiquitous computing. However, the weak designs of privacy protection result in more potential risks that users have to face. This paper presents a deep insight into the designs of privacy protection, especially from the perspective of location privacy. Three main potential risks and...
The common way to protect privacy is to use K-anonymity in data publishing. This paper will analyse comprehensively the current research situation of K-anonymity model used to prevent privacy leaked in data publishing, we study the characteristics of sensitive attribute diversity of K-Anonymity, and propose CBK(L,K)-Anonymity algorithm in order to solve the problem of privacy information leakage in...
With the rising of data mining technology and the appearances of data stream and uncertain data technology etc, individual data, the enterprise data are possibly leaked at any moments, so the data security has become nowadays the main topic of information security. The common way to protect privacy is to use K-anonymity in data publishing. This paper will analyse comprehensively the current research...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.