Data protection, anonymity and courts

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentic Attributes with Fine-Grained Anonymity Protection

Collecting accurate pro le information and protecting an individual's privacy are ordinarily viewed as being at odds. This paper presents mechanisms that protect individual privacy while presenting accurate|indeed authenticated|pro le information to servers and merchants. In particular, we give a pseudonym registration scheme and system that enforces unique user registration while separating tr...

متن کامل

M-Score and K-Anonymity: A Model for Detection And Protection of Data

Abstract--Conversely, limiting access to the information in the interests of preserving secrecy might damage their ability to implement the actions that can best serve the organization. Therefore, data leakage and data misuse detection mechanisms are essential in identifying malicious insiders. One of the emerging concept in micro data protection is kanonymity, which has been recently proposed ...

متن کامل

Anonymity in Unstructured Data

In this paper we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of transactional data that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adv...

متن کامل

Achieving k-Anonymity Privacy Protection Using Generalization and Suppression

Often a data holder, such as a hospital or bank, needs to share person-specific records in such a way that the identities of the individuals who are the subjects of the data cannot be determined. One way to achieve this is to have the released records adhere to kanonymity, which means each released record has at least (k-1) other records in the release whose values are indistinct over those fie...

متن کامل

Privacy and Anonymity Protection in Computational Grid Services

In computational grid computing, grid nodes spanning over several diverse computing resources belonging to heterogeneous administrative domains form the backbone of Virtual Enterprise [VE]. In order to offer service-on-demand, various service providers, requesters, brokers and administrators collaborate in request-response manner among each other in Service Oriented Virtual Enterprise through s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Maastricht Journal of European and Comparative Law

سال: 2019

ISSN: 1023-263X,2399-5548

DOI: 10.1177/1023263x19851628