D13.8: Applicability of privacy models
نویسندگان
چکیده
Title: “D13.8: Applicability of privacy models” Author: WP13 Editors: David-Olivier Jaquet-Chiffelle Bernhard Anrig Emmanuel Benoist (VIP Bern University of Applied Sciences) Reviewers: Jozef Vyskoc (VaF, s.r.o. Slovak Republic) Hans J.C. Buitelaar (Tilburg U., Netherlands) Identifier: D13.8 Type: [Deliverable] Version: 1.0 Date: Monday, 02 June 2008 Status: [Final] Class: [Public] File: fidis-wp13-del13.8.pdf
منابع مشابه
A Comparative Study of the Concept of "Privacy" in the House of Islamic Countries in the Middle East (Case Study: Houses of Isfahan, Sanaa, Damascus)
One of the most important dimensions in the design of Islamic buildings is the creation of privacy. The word ‘privacy’ means ‘environment’, referring to a place where its support and protecting is obligatory and as a whole, it is a barrier to avoid others’ assault. It is of utmost importance in traditional houses especially in Islamic countries the houses separate the family privacy from the st...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملA New RFID Privacy Model
This paper critically examines some recently proposed RFID privacy models. It shows that some models suffer from weaknesses such as insufficient generality and unrealistic assumptions regarding the adversary’s ability to corrupt tags. We propose a new RFID privacy model that is based on the notion of indistinguishability and that does not suffer from the identified drawbacks. We demonstrate the...
متن کاملFrom Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consi...
متن کامل