Accountable privacy supporting services

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Accountable Privacy

As the Internet has gained widespread use, and advanced technologies such as high-speed multi-media technologies and automated digital monitoring have become a reality, privacy is at the greatest risk of all time. At the same time, sophisticated threats from hackers, terrorists, thieves, and others that would abuse privacy highlight the need to nd technologies that provide some accountability. ...

متن کامل

Privacy-Preserving Accountable Computation

Accountability of distributed systems aims to ensure that whenever a malicious behavior is observed, it can be irrefutably linked to a malicious node and that every honest node can disprove false accusations. Recent work, such as PeerReview and its extensions, shows how to achieve accountability in both deterministic and randomized systems. The basic idea is to generate tamper-evident logs of t...

متن کامل

Supporting privacy for U-Commerce tourism services

M-Commerce concerns delivering E-commerce services that take into account the mobility of the user. There are additional factors that are important for these kinds of E-commerce services such as Ubiquity (being available everywhere), Universality (being able to operate in heterogeneous environments), Uniqueness (relating services to a context such as the location) and working in Unison (allowin...

متن کامل

Supporting User Privacy in Location Based Services

To offer location based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. We propose the use of constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, as a means to reduce this threat. Constraints may themselves reveal information to any ...

متن کامل

Privacy-Preserving Accountable Cloud Storage

In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving acc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Identity in the Information Society

سال: 2009

ISSN: 1876-0678

DOI: 10.1007/s12394-009-0023-5