Accountable privacy supporting services
نویسندگان
چکیده
منابع مشابه
Accountable Privacy
As the Internet has gained widespread use, and advanced technologies such as high-speed multi-media technologies and automated digital monitoring have become a reality, privacy is at the greatest risk of all time. At the same time, sophisticated threats from hackers, terrorists, thieves, and others that would abuse privacy highlight the need to nd technologies that provide some accountability. ...
متن کاملPrivacy-Preserving Accountable Computation
Accountability of distributed systems aims to ensure that whenever a malicious behavior is observed, it can be irrefutably linked to a malicious node and that every honest node can disprove false accusations. Recent work, such as PeerReview and its extensions, shows how to achieve accountability in both deterministic and randomized systems. The basic idea is to generate tamper-evident logs of t...
متن کاملSupporting privacy for U-Commerce tourism services
M-Commerce concerns delivering E-commerce services that take into account the mobility of the user. There are additional factors that are important for these kinds of E-commerce services such as Ubiquity (being available everywhere), Universality (being able to operate in heterogeneous environments), Uniqueness (relating services to a context such as the location) and working in Unison (allowin...
متن کاملSupporting User Privacy in Location Based Services
To offer location based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. We propose the use of constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, as a means to reduce this threat. Constraints may themselves reveal information to any ...
متن کاملPrivacy-Preserving Accountable Cloud Storage
In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving acc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Identity in the Information Society
سال: 2009
ISSN: 1876-0678
DOI: 10.1007/s12394-009-0023-5