D13.8: Applicability of privacy models

نویسندگان

  • David-Olivier Jaquet-Chiffelle
  • Bernhard Anrig
  • Emmanuel Benoist
  • Jozef Vyskoc
چکیده

Title: “D13.8: Applicability of privacy models” Author: WP13 Editors: David-Olivier Jaquet-Chiffelle Bernhard Anrig Emmanuel Benoist (VIP Bern University of Applied Sciences) Reviewers: Jozef Vyskoc (VaF, s.r.o. Slovak Republic) Hans J.C. Buitelaar (Tilburg U., Netherlands) Identifier: D13.8 Type: [Deliverable] Version: 1.0 Date: Monday, 02 June 2008 Status: [Final] Class: [Public] File: fidis-wp13-del13.8.pdf

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Study of the Concept of "Privacy" in the House of Islamic Countries in the Middle East (Case Study: Houses of Isfahan, Sanaa, Damascus)

One of the most important dimensions in the design of Islamic buildings is the creation of privacy. The word ‘privacy’ means ‘environment’, referring to a place where its support and protecting is obligatory and as a whole, it is a barrier to avoid others’ assault. It is of utmost importance in traditional houses especially in Islamic countries the houses separate the family privacy from the st...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

A New RFID Privacy Model

This paper critically examines some recently proposed RFID privacy models. It shows that some models suffer from weaknesses such as insufficient generality and unrealistic assumptions regarding the adversary’s ability to corrupt tags. We propose a new RFID privacy model that is based on the notion of indistinguishability and that does not suffer from the identified drawbacks. We demonstrate the...

متن کامل

From Data Privacy to Location Privacy: Models and Algorithms

This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008