The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
In view of the information leakage brought by removable storage device, the paper designed and implemented the anti-leak security system based on C\S architecture. The system taken filter driver technology to provide fine-grained and flexible access control over removable storage devices and file transparent encryption and decryption, and implemented the effective monitoring of removable storage devices...
Real data used in research projects give rise to conflicts of protecting privacy and providing more functions: functionality requires trying to make use of maximum amount of data, while privacy requirements try to protect such information from being leaked. In this paper, a new model is proposed to capture relationships between database attributes and to record users' knowledge about database so as...
One of the challenging problems cloud computing is facing today is the security of data in the cloud. Since the physical location of user data in the cloud is unknown and the data are often distributed across multiple cloud services, a user controllable and privacy preserving access control mechanism is necessary for the success of cloud computing in general and for the protection of user data in...
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to...
The security concerns with outsourcing XML databases are well known. In the past few years researchers have proposed solutions to many of the concerns in the current outsourced database model. However one area remains relatively untouched, the securing of queries to outsourced XML databases. Most current research fails to even specify how the user will actually query the outsourced data. Therefore...
In current computing environments, collaborative computing has been a central concern in Ubiquitous, Convergent, and Social Computing. "MobiLife?? and "MyLifeBits?? are the leading projects for representing dailylifeservices and their systems require complicate and collaborative network systems. The collaborative computing environments remain in high potential risks for users' security and...
The number and size of different kinds of electronic files (text, pictures and videos) incorporated into eLearning environments were dramatically increased during the last ten years and this triggered a development of new web based systems for that specific environment. These systems were developed to satisfy current and specific users' needs which lead to appearance of very heterogeneous environments...
The electronic identity (eID) is being positioned to be a basic tool for identification, authentication and authorization in application domains ranging from eCommerce in private sector to eGovernance in public sector. A practical and flexible eID should be usable in both a network-connected online setting as well as in conventional offline situations. While improving security of communication and...
Twins are two extensions onto SQL to support user privacy in social networks: one is corporate-based and the other is user-centric, corresponding to well-known mandatory access control and discretionary access control models, respectively. This paper illustrates the former. The approach adds some predicates to the CREATE TABLE command to capture common corporate-based user privacy requirements, such...
Patient-controlled Personal Health Record (PHR) systems may facilitate a patient not only to share her health records with healthcare professionals but also to control her health privacy, in a convenient and easy way. Governed by privacy protection laws, explicit consent/permission of the respective patient is a prerequisite for sharing personal health records. However, in emergency situations, when...
Upholding the privacy of data has gathered increased interest in the current industrial scenario. The databases that hold personal information and the individuals' choices of privacy are often subjected to attacks from mischievous sources which try to access undisclosed data. The means used to achieve such ends may be in the form of complex queries that combine sensitive data with the non-sensitive...
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware computing. This paper describes our experiences in building a middleware component, the context privacy engine (CPE), that enforces a role-based, context-dependent privacy model for enterprise domains. While fundamentally an ACL-based...
This paper presents an enhanced design of the community authorization service (CAS) which supports centralized, fine-grain access control by managing the memberships, service types, resource objects and security policies of a virtual organization (VO). The current CAS provides fundamental solutions regarding user privacy, authentication and authorization, but it has some limitations due to its centralized...
We know that large database contain certain information that must be protected against unauthorized access. One known fact which is very important in data mining is discovering the association rules from database of transactions where each transaction consists of set of items. In this paper we discuss confidentiality issues of a broad category of association rules. Two important terms support and...
To enable a rich attribute-based authorization system, it is desirable that a large number of user attributes are available, possibly provided by multiple entities. The user may be required to aggregate his attributes and present them to a service provider to prove he has the right to access some service. In this paper, we present AttributeTrust - a policy-based privacy enhanced framework for aggregating...
Safeguarding patientspsila private information is one of the most challenging issues in the design and implementation of modern e-Health systems. Recent advances in Hippocratic Databases (HDB) show a promising direction towards the enforcement of privacy policies in e-Health systems. This paper tackles issues in applying the HDB design to e-Health systems. More specifically, we design an architecture...
As distributed collaborative applications and architectures are adopting policy-based solutions for tasks such as access control, network security and data privacy, the management and consolidation of a large number of policies is becoming a crucial component of such solutions. In large-scale distributed collaborative applications like Web services, there is need for analyzing policy interaction and...
We study the problem of auditing a batch of SQL queries: given a forbidden view of a database that should have been kept confidential, a batch of queries that were posed over this database and answered, and a definition of suspiciousness, determine if the query batch is suspicious with respect to the forbidden view. We consider several notions of suspiciousness that span a spectrum both in terms of...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.