The Anonymizer Protecting User Privacy on the Web
نویسنده
چکیده
The employee or politician who wants to protect his or her privacy when viewing sensitive medical information, a competitor’s web site, sexual materials, or a web site catering to a marginalized group (e.g., gay rights, pro-choice or pro-life). The scientist who is asked to anonymously review a colleague’s article submission and wants to gather background materials from the author’s web site. The law-enforcement agent who wants to investigate a web site suspected of criminal activity without revealing that his or her Internet host is, say, fbi.gov. The consumer who wants to prevent marketers from compiling user profiles of his or her browsing, newsreading, shopping, financial and travel interests.
منابع مشابه
The Anonymizer Protecting User
The employee or politician who wants to protect his or her privacy when viewing sensitive medical information, a competitor’s web site, sexual materials, or a web site catering to a marginalized group (e.g., gay rights, pro-choice or pro-life). The scientist who is asked to anonymously review a colleague’s article submission and wants to gather background materials from the author’s web site. T...
متن کاملA Framework for Private Location-based Queries using Cryptographic Protocols
An important privacy issue in Location Based Services (LBS) is to hide a user’s identity and location while still providing quality service. A user’s identity can be easily hidden through anonymous web browsing services, however, a user’s location can reveal a user’s identity. For example, if a user at home asks queries such as “Find the nearest hospital around me” to a LBS server, then based o...
متن کاملEnhancing Web privacy and anonymity in the digital era
This paper presents a state-of-the-art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture, operational principles and vulnerabilities. Furthermore, to facilitate a detailed comparative analysis, the appropriate parameters have been selected and grouped in classes of comparison criteria, in the form of an in...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کامل