The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We focus on the simpler case when the data lies in a metric space which is instrumental in introducing the main ideas and notation. Specifically,...
Conventional online social networks (OSNs) are implemented in a centralized manner. Although centralization is a convenient way for implementing OSNs, it has several well known drawbacks. Chief among them are the risks they pose to the security and privacy of the information maintained by the OSN; and the loss of control over the information contributed by individual members.
In this paper we explore two issues: Federated Identity Management and Context-Aware Services. In the last decade or so we have seen these two technologies gaining considerable popularities as they offer a number of benefits to the user and other stakeholders. However, there are a few outstanding security and privacy issues that need to be resolved to harness the full potential of such services. We...
Nowadays, network operators face the challenge to host millions of devices having various needs. With the traditional connectivity management in EPS/LTE accesses, security services such as confidentiality and integrity protection are designed to be activated in a systematic manner leading to significant signaling and processing cost. In this paper we are interested in looking at security implementation...
Positive emotions have been proven to be a key factor for successful learning. In modern personalized learning environments informal learning takes a prominent role and with this the use of computer-mediated communication. Communication data, like for example chat logs, can be harvested for sentiments. Most sentiment analyses operate processing only verbal information. But the messages exchanged in...
Several context-aware mobile recommender systems have been recently proposed to suggest points of interest (POIs). Ideally, a user of these systems should not be allowed to know the preferred POIs of another user, since they reveal sensitive information like political opinions, religious beliefs, or sexual orientations. Unfortunately, existing POI recommender systems do not provide any formal guarantee...
Content usage statistics from superdistribution users have great commercial values since they can be used for any number of purposes including marketing, accounting, and/or fraud prevention. However tracking content usage under the superdistribution model poses a great challenge since most content users have no explicit pre-established relationship with the content provider. In this paper, we present...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
Integrity checking is important in many activities, such as logistic, telecommunication or even day to day tasks such as checking for someone missing in a group. While the computing and telecommunication worlds commonly use digital integrity checking, many activities from the real world do not beneficiate from automatic mechanisms for ensuring integrity. We propose a spatial computing approach where...
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to...
Personal Identifiable Information (PII) describes a relationship between information and a uniquely identifiable person. Sensitive PII refers to a category of PII that contains significant information about individuals. In general, sources of sensitivity of PII can be tracked by partitioning the basic unit of linguistic information into three parts: identity, verb, and the reminder of the linguistic...
The anonymization of location based queries through the generalization of spatio-temporal information has been proposed as a privacy preserving technique. We show that the presence of multiple concurrent requests, the repetition of similar requests by the same issuers, and the distribution of different service parameters in the requests can significantly affect the level of privacy obtained by current...
The electronic identity (eID) is being positioned to be a basic tool for identification, authentication and authorization in application domains ranging from eCommerce in private sector to eGovernance in public sector. A practical and flexible eID should be usable in both a network-connected online setting as well as in conventional offline situations. While improving security of communication and...
As many people are now taking advantages of on-line services, the value of the private data they own comes into sight as a problem of fundamental concern. This paper takes the position that, individuals are entitled to secure control over their personal information, disclosing it as part of a transaction only when they are fairly compensated. To make this a concrete possibility, users require technical...
With the rapid development of applications in open distributed virtual environments, such as e-Business and virtual games, privacy is becoming a critical issue. This paper presents an intelligent agent-based framework for privacy payoff in virtual environments, with special focus on capability-based negotiation services. These services take into consideration users' entitlement to benefit from revealing...
This paper discusses the combination of a nifty pseudonym generation mechanism that is used to veil the real world identity of users with semantic user context descriptions and policy reasoning to express decisions of users and thus protects their sensitive location information. The expected development of a new class of mobile applications is further fostered by the underlying service architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.