Krishnamurthy et al., 2009 - Google Patents
On the leakage of personally identifiable information via online social networksKrishnamurthy et al., 2009
View PDF- Document ID
- 10518557903210853170
- Author
- Krishnamurthy B
- Wills C
- Publication year
- Publication venue
- Proceedings of the 2nd ACM workshop on Online social networks
External Links
Snippet
For purposes of this paper, we define" Personally identifiable information"(PII) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific individual. The popularity of …
- 235000014510 cooky 0 description 54
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Krishnamurthy et al. | On the leakage of personally identifiable information via online social networks | |
Khan et al. | An empirical analysis of the commercial vpn ecosystem | |
US8601591B2 (en) | Method and apparatus for providing web privacy | |
Krishnamurthy et al. | Characterizing privacy in online social networks | |
Krishnamurthy et al. | Privacy leakage vs. protection measures: the growing disconnect | |
Krishnamurthy et al. | Measuring privacy loss and the impact of privacy protection in web browsing | |
Chaabane et al. | Censorship in the wild: Analyzing Internet filtering in Syria | |
Aimeur et al. | Towards a privacy-enhanced social networking site | |
Bujlow et al. | Web tracking: Mechanisms, implications, and defenses | |
Chen et al. | Privacy issues and solutions in social network sites | |
Roberts et al. | When certificate transparency is too transparent: Analyzing information leakage in https domain names | |
Aïmeur et al. | Upp: User privacy policy for social networking sites | |
Kambourakis et al. | Encrypted DNS: The good, the bad and the moot | |
US20200034487A1 (en) | Method of Implementing A Topic Based Social Media Network | |
Kuyumdzhiev | Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security | |
Al Mushayt | Threats and anti-threats strategies for social networking websites | |
Lodie et al. | Is it Personal data? Solving the gordian knot of anonymisation | |
Mittal | User privacy and the evolution of third-party tracking mechanisms on the world wide web | |
Takata et al. | Risk analysis of cookie sharing by link decoration and cname cloaking | |
Al-Turjman et al. | Security in social networks | |
Sonntag | DNS traffic of a Tor exit node-an analysis | |
Charoen | The analysis of the computer crime act in thailand | |
Verleg et al. | Cache Cookies: searching for hidden browser storage | |
Westers et al. | Single Sign-On Privacy: We Still Know What You Did Last Summer | |
Zhu et al. | User agent and privacy compromise |