The Anonymizer Protecting User
نویسنده
چکیده
The employee or politician who wants to protect his or her privacy when viewing sensitive medical information, a competitor’s web site, sexual materials, or a web site catering to a marginalized group (e.g., gay rights, pro-choice or pro-life). The scientist who is asked to anonymously review a colleague’s article submission and wants to gather background materials from the author’s web site. The law-enforcement agent who wants to investigate a web site suspected of criminal activity without revealing that his or her Internet host is, say, fbi.gov. The consumer who wants to prevent marketers from compiling user profiles of his or her browsing, newsreading, shopping, financial and travel interests.
منابع مشابه
The Anonymizer Protecting User Privacy on the Web
The employee or politician who wants to protect his or her privacy when viewing sensitive medical information, a competitor’s web site, sexual materials, or a web site catering to a marginalized group (e.g., gay rights, pro-choice or pro-life). The scientist who is asked to anonymously review a colleague’s article submission and wants to gather background materials from the author’s web site. T...
متن کاملA Framework for Private Location-based Queries using Cryptographic Protocols
An important privacy issue in Location Based Services (LBS) is to hide a user’s identity and location while still providing quality service. A user’s identity can be easily hidden through anonymous web browsing services, however, a user’s location can reveal a user’s identity. For example, if a user at home asks queries such as “Find the nearest hospital around me” to a LBS server, then based o...
متن کاملCANINE: A NetFlows Converter/Anonymizer Tool for Format Interoperability and Secure Sharing
We created a tool to address two problems with using NetFlows logs for security analysis: (1) NetFlows come in multiple, incompatible formats, and (2) the sensitivity of NetFlow logs can hinder the sharing of these logs. We call the NetFlow converter and anonymizer that we created to address these problems CANINE: Converter and ANonymizer for Investigating Netflow Events). This paper demonstrat...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کامل