The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different...
Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based...
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the convenience provided by LBS, users may lose privacy since the untrusted LBS server has all the information about users in LBS and it may track them in various ways or release their personal data to third parties. To address the privacy issue, we propose a Dummy-Location Selection (DLS) algorithm to achieve k-anonymity...
Delivering the hosted services via the internet is called cloud computing. It is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning and allows enterprises to start from the small and increase resources only when there is a rise in service demand. Central component that manages the allocation of virtual resources for a cloud infrastructure's physical...
Built on the fundamental concepts of grid, cluster & distributed computing and following the evolution from mainframe computers to client/server models, Cloud computing is a novel paradigm where computing resources are provisioned on demand. By outsourcing computing and storage requirements to Cloud, user enjoys numerous benefits, such as cost saving through pay for you use model, flexibility...
when mobile users search points of interest from location based service, they always should provide their accurate locations, which may leak users' location privacy. To protect users' location privacy, some two-tie approaches have been imposed. However, existing approaches are either hard to implement or may lead to high communication cost. In this paper, we present a novel approach, called Guess-Answer...
We use authentication services many times a day. Without user authentication, it would be impossible to use email accounts, discussion boards, e-banking or even electronic communication. On the other hand, we release a lot of personal information during every authentication process. Our login can be linked to used services and assets by service providers. The frequency of usage and therefore the map...
In the virtual computing environment the securing co-operation is based on the trust between the strangers, automated trust negotiation provides a mean to establish strangers in distributed situation. However, the current negotiation take it for granted that the access control policy of negotiation is correct, which will probably has many problems to lead negotiation to fail. This paper emphasizes...
To many users, the data security in Software-as-a-service (SAAS) is troubling, especially the sensitive data security. In this paper, further separation of user data is adopted, allowing users choose another unrelated third-party to provide database services. And the all operations to the data in the database, such as adding, deleting, encryption, are all still directly executed by the relevant software...
The second life library (SLL) is a virtual environment which providing library services in the context of second life. This article discusses the kinds of users' privacy issues stemming from the SLL. Various privacy-enhancing measures can be adopted for privacy protection: the SLL's privacy policy, privacy-enhancing technologies, protection for the avatar privacy, users' moral self-discipline, instuction...
Media Space is a network application in which video images are continuously sent, received, and shared by coworkers. Therefore, Media Space is considered to have a high risk of giving its users a sense of privacy violation. So far, maintaining reciprocity of the communication is considered to have the most significant effect for perceived risk of privacy violation. In this research, we implemented...
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great dependence on the use application of statically defined views. In this paper, we propose the procedure by which current RDBMS can be transformed into their privacy-preserving equivalents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.