The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy is an important issue that has raised particular concerns among many research areas. This issue dramatically increases with the proliferation of the Web services composition paradigm. This is mainly due to the high dynamism and untrustworthiness characteristics of the services to be composed, which impose high levels of risk on the interacting parties. Existing technologies for managing and...
While researchers have developed many tools, techniques, and protocols for improving software security, exploits and breaches are only becoming more frequent. Some of this gap between theoretical security and actual vulnerability can be explained by insufficient consideration of human factors, broadly termed usability, when developing these mechanisms. In particular, security mechanisms may be difficult...
Conformance checking is a crucial challenge for modern inter-organizational business processes when critical security, privacy and workflow constraints must be satisfied to ensure the reliability of multi-party business procedures. Many of these constraints can be expressed in terms of causal dependencies, and verifying such dependencies can be fundamental to determine the correctness of transactions...
Monetization of personal identity information has become a major component of modern business models, driving innovation in many industries. This phenomena is common place given that parties to business transactions and social interactions usually rely on the issue of claims, and disclosure of unique attributes and credentials for proofs and verification of identity. However, the heightened societal...
Computing k-nearest-neighbor graphs constitutes a fundamental operation in a variety of data-mining applications. As a prominent example, user-based collaborative-filtering provides recommendations by identifying the items appreciated by the closest neighbors of a target user. As this kind of applications evolve, they will require KNN algorithms to operate on more and more sensitive data. This has...
A signature scheme is malleable if, on input a message and a signature, it is possible to efficiently compute a signature on a related message, for a transformation that is allowed with respect to this signature scheme. In this paper, we first provide new definitions for malleable signatures that allow us to capture a broader range of transformations than was previously possible. We then give a generic...
In recent years, concerns of privacy have become more prominent for social networks. Anonymizing a graph meaningfully is a challenging problem, as the original graph properties must be preserved as well as possible. We introduce a generalization of the degree anonymization problem posed by Liu and Terzi. In this problem, our goal is to anonymize a given subset of nodes while adding the fewest possible...
We take a detailed look at how users, while focusing on non-permission tasks, notice and fix access-control permission errors depending on where the access-control policy is spatially located on a photo-sharing website. The access-control policy was placed on an online photo-sharing website under the photo or album, on the sidebar, or on a separate settings page. We find that placing the access-control...
There is an increasing penetration of smart phones within enterprises. Most smart phone users now run both enterprise as well as personal applications simultaneously on their phones. However, most of the personal apps that are downloaded from public market places are hardly tested for enterprise grade security, and there have been instances of malware appearing in public markets that steal sensitive...
This paper describes how members of a community can collaboratively protect the privacy of the information they share via email. An extension of email tagging is used to represent communities and establish privacy protection boundaries. The approach is illustrated informally by scenarios and the key concepts are defined formally. The contributions of this paper are: (1) extending the idea of boundary...
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do not...
Content usage statistics from superdistribution users have great commercial values since they can be used for any number of purposes including marketing, accounting, and/or fraud prevention. However tracking content usage under the superdistribution model poses a great challenge since most content users have no explicit pre-established relationship with the content provider. In this paper, we present...
User awareness has become a popular feature in many social web applications. In classic text-based web-systems, user awareness features show how many users are online in a web application or how many users are accessing the same web page. When time based media like web lectures are concerned this approach comes to its limits since time-based media are inherently different from classic text-based media...
Whether consumers' risk perception differs or not when purchasing different services online? 115 participants were investigated to discover the differences in the lab experiment, and the results indicated that: a) Consumers perceived higher risk in buying professional services than mass services, interactive services, and supporting services online, while the differences among the latter three services...
Personal information sharing is one of the most common online activities. Most of the times we feel forced to give up about some privacy in order to share a piece of information with others. This paper reflects on the anonymity, integrity, privacy of users' personal information and it's scattering across the Web by taking an approach to digital identity management concept. Consequently it also reflects...
Digital Identity is the representation of the overall known information about a user across online applications. Digital identity management is the collection of processes, policies and technologies to manage the complete life cycle of users' identities, such as creation, management, and destruction. Most web applications request users to have a registered digital identity in their system to allow...
Reputation is a well established means to determine trustworthiness in online systems in various contexts, e.g. online transactions, product recommendation, e-mail spam fighting, etc. However, typically these reputation systems are "closed'' outside of the community: the set of participants, their possible actions, their evaluation and the mechanism to derive trust evaluations are predetermined...
As many people are now taking advantages of on-line services, the value of the private data they own comes into sight as a problem of fundamental concern. This paper takes the position that, individuals are entitled to secure control over their personal information, disclosing it as part of a transaction only when they are fairly compensated. To make this a concrete possibility, users require technical...
This paper presents patterns for privacy policies to be used in web sites, in particular e-commerce and e-business sites. Because of their financial aspects, the users accessing those sites need to provide personal information, and expect integrity, security, and privacy. The patterns are derived from a study of the 33 most accessed e-commerce sites in Brazil, where it was possible to observe that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.