Reverse Privacy Engineering

نویسنده

  • Julien Pierre
چکیده

Facing the problems of personal data industrialization, many technical and legal solutions have been proposed. Pro-privacy legislation and new design patterns try to make engineers and merchants more responsible. Although these efforts must be maintained from these actors, we believe that such a consideration for privacy, focused on commercial transactions, leaves the individual subjects and their social interactions at the deadlock. We suggest reversing privacy engineering by empowering users in context. Thus we propose to model privacy among the concept of “privatory framework” [11], then compare face-to-face and computer-mediated privatory frames, mainly in social network sites (SNS). From these results, we can discuss technical potential allowing the user to completely define privatory framework of her computer-mediated social interactions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure collaboration in design and supply chain management

Increasing global competition has led to massive outsourcing of manufacturing businesses. Such outsourcing practices require effective collaborations between the manufacturing companies and their partners by sharing a large amount of information. In the meantime, since some of the partners are also potential competitors, protection of confidential information, particularly intellectual property...

متن کامل

Malicious Behavior Monitoring for Android Applications

Android, as a modern popular open source mobile platform, makes its security issues more prominent, especially in user privacy leakage. In this paper, we proposed a twostep model which combines static and dynamic analysis approaches. During the static analysis, permission combination matrix is used to determine whether an application has potential risks. For those suspicious applications, based...

متن کامل

A Robust Data-obfuscation Approach for Privacy Preservation of Clustered Data

Privacy is defined as the freedom from unauthorized intrusion. The availability of personal information through online databases such as government records, medical records, and voters’ lists poses a threat to personal privacy. Intelligent search engines and data mining techniques further exacerbate the problem of privacy by simplifying access and retrieval of personal records. Data Obfuscation...

متن کامل

Peer-to-Peer Privacy Preserving Reputation Inquiry: An Agent Assistant Approach

This research presents a privacy preserving peer-to-peer communication mechanism that allows peers using their personal agents to obtain reputation information of each other through a pair of trustworthy mediator proxies. A mediator proxy is considered trustworthy, if even when it is compromised, it can guarantee three conditions: (1) the anonymity of the identity of the responders and the targ...

متن کامل

Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks

BankID is a PKI-substitute widely deployed by Norwegian banks to provide digital signatures and identification on the internet. We have performed a reverse-engineering of part of the BankID system and analysed the security protocols and the implementation of certain cryptographic primitives. We have found cryptographic weaknesses that may indicate security problems, protocol flaws facilitating ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013