Using caching for browsing anonymity

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymity for Trust Holders using k-anonymity Chord

Anonymity is important in a peer-to-peer system to protect peers that offer/request services. We propose an anonymity scheme on Chord to provide a peer k-anonymity protection against a global passive adversary who can sniff all the communication on a network. For collaborating adversaries, anonymity is protected as long as they perform only passive attacks. An encryption scheme ensures that pee...

متن کامل

Fast Browsing of Large Scale Images Using Server Prefetching and Client Caching Techniques

To support fast browsing of large scale images in a client/server environment, we propose a prediction-based server prefetching and client caching algorithm. By prefetching the predicted data using available network resources, the system can eeectively reduce the size of data needed for the next access. While traditional browsing cache systems can not address both nonstationary and stationary b...

متن کامل

Using Simulated Annealing for k-anonymity

In this note, we describe a method of simulated annealing for producing k-anonymity. For analytic purposes, there is no reason to expect that the method will be superior or worse than the method of applying genetic algorithms used by Iyengar (2002). The main appeal of simulated annealing is the amount of control it allows of the microaggregation process. The k-anonymity problem is known to be N...

متن کامل

Using TCOZ for Modeling Web Caching

A model of web caching is built in this paper. Web caching on the Internet can be broken down into some elements like various servers and terminal. Further, each element can be divided into some components. This paper describes all of the needed components and how they are composed to make an element. A formal method, TCOZ, is used to build this conceptual model. TCOZ notation is very suitable ...

متن کامل

Protecting Privacy Using k-Anonymity

Objective: There is increasing pressure to share health information and even make it publicly availab However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is kanonymity. There have been no evaluations of the actual re-identification probabili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGecom Exchanges

سال: 2003

ISSN: 1551-9031,1551-9031

DOI: 10.1145/1120709.1120713