The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
Attack on privacy of the users on social media is a known phenomenon. A prominent example of this is the Facebook Beacon and the AOL search scandal. A social networking user is also prone to screen scrapping attack. Data Sanitization is the process of disguising sensitive information by overwriting it with realistic looking but false data of a similar type. We propose a system that will take user...
Provides an abstract for each of the panel presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
In this paper, we evaluate privacy preservation capability of biometric hashing methods. Although there are some work on privacy evaluation of biometric template protection methods in the literature, they fail to cover all biometric template protection methods. To the best of our knowledge, there is no work on privacy metrics and assessment for biometric hashing methods. We use several metrics under...
The Internet of Things (IoT) has the potential to transform our daily lives and societies. This is, at least in part, due to its massively distributed and ubiquitous nature. To realize the benefits of the IoT, security and privacy issues associated with the use of the IoT need to be identified and addressed properly. In this paper, our focus is on protecting the privacy of the users of location-based...
Positioning capabilities offered in modern mobile devices enable usage of location-based services. Privacy and security is of great importance for related applications. We present a framework that allows conducting research on anonymity techniques in a real-life environment using smartphones. The proposed solution also includes logging mechanisms that facilitate positioning research dataset development...
Traffic analysis, where eavesdroppers retrieve networking information such as source-destination pairs and paths of data flow, severely compromises user privacy and can equip an adversary to launch more powerful network attacks. Anonymous communication, where users exchange information without revealing the communicating parties is essential in any data network. Chaum Mixing, where relay nodes or...
Along with the development of advanced mobile handset and ICT network, application services using personal ID and life log information have been developed all over the world. Although such information can contribute to promoting not only innovative services but also the creation of resilient social system corresponding to emergency and disaster, there is a concern about privacy protection at the same...
This paper contains a summary of a significant amount of findings carried out collectively by a global research community specifically aimed at determining mutually beneficial and hot topics for international collaboration on the research and development of Trustworthy ICT. The paper highlights a sampling of these topics that were deemed to produce the most impact and it provides an introduction to...
The continuous growth and development of ecommerce around the world is disproportionate to Asianconsumers' adoption of online shopping. The average adoption rate in Asian countries is low compared to that in western countries. The purpose of this paper is to provide an understanding of the current situation regarding online shopping behavior in Asian countries, especially Malaysia. The factors that...
Being a new Internet application, social-based P2P network, which merges P2P file sharing technology and social network, is drawn more and more attention. However, it also brings in new challenges when facing the problems of trust management and personal privacy protection. In this paper, we aim at social-based P2P, and design a set of trust management mechanisms with peer uncertain risk evaluation...
A privacy-secure content trading system based on semi-blind fingerprinting is presented. Semi-blind fingerprinting provides privacy-secure content trading as secure as blind fingerprinting at feasible processing cost with sufficient robustness. This system assures a fair trading for both a content provider and a purchaser which is effective for a market where a number of small or not so reliable content...
This paper is positioned around the notion that in an era of ubiquitous computing and digitalization of data, the Information Assurance in Security and Privacy (IASP) issues cannot be contained within geographic boundaries. Instead, they must be approached from a comparative cross-border perspective. Such a multi-dimensional inspection is even more critical because in the domain of electronic data...
Network convergence, as a representative of network integration of Internet, telecommunication network and cable television network, is the general trend of development of the information society. Also, it becomes a hotspot of recently research. Converged network is a full service network, which means it has the ability to provide various bandwidth, wire or wireless services and applications, including...
IT Professional is a publication for practitioners, and proudly so. In this department, we often talk about the practical side of ethics issues, including advice on how professionals can recognize, analyze, and make judgments on challenging questions about right, wrong, and computing. But in this issue's installment, the author takes a somewhat broader view, starting with an examination of ethical...
There is a growing realization among many researchers that if we want to model the Web and understand its future trajectory; if we want to understand the architectural principles that have provided for its growth; and if we want to be sure that it supports the basic social values of trustworthiness, privacy, and respect for social boundaries, then we must chart out a research agenda that targets the...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
This paper presents an advanced approach to access control on the Web. It presents an easy deployable package that exploits emerging trust negotiation approaches by integrating them in a Web scenario. In such a scenario advance decisions can be made based on expressive conditions, including credentials exchanged among entities in order to establish enough trust to be granted access to a resource,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.