Landau et al., 2023 - Google Patents
Reversing Privacy Risks: Strict Limitations on the Use of Communications Metadata and Telemetry InformationLandau et al., 2023
View PDF- Document ID
- 2013735951022001690
- Author
- Landau S
- Leon P
- Publication year
- Publication venue
- Colo. Tech. LJ
External Links
Snippet
When Assistant US Attorney Patrick Fitzgerald was investigating the 1993 World Trade Center bombing in the mid-1990s, he sought to connect the actions of various suspects." I would find defense attorneys who would say Mr. X and Mr. Y didn't know each other or never …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11568444B2 (en) | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |
Quercia et al. | Friendsensing: recommending friends using mobile phones | |
US10129211B2 (en) | Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms | |
Damiani | Location privacy models in mobile applications: conceptual view and research directions | |
US20150261856A1 (en) | Method to form a real time intent based social group | |
US11783372B2 (en) | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |
Petersen | Scoot over smart devices: The invisible costs of rental scooters | |
US20240334159A1 (en) | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |
Xue et al. | Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics: A WeChat Case Study | |
Sivan et al. | Analysis of location data leakage in the Internet traffic of Android-based mobile devices | |
Landau et al. | Reversing Privacy Risks: Strict Limitations on the Use of Communications Metadata and Telemetry Information | |
Landau | Categorizing uses of communications metadata: Systematizing knowledge and presenting a path for privacy | |
Auliya et al. | A review on smartphone usage data for user identification and user profiling | |
Levis | Smartphone, dumb regulations: Mixed signals in mobile privacy | |
US20200153935A1 (en) | System and method for enriching consumer management records using hashed mobile signaling data | |
US20210243596A1 (en) | Shared Anonymized Databases of Telecommunications-Derived Behavioral Data | |
Wang et al. | A Strategy of Cluster‐Based Distributed Location Service | |
WO2021061897A1 (en) | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |
Anjomshoa | Behavioral User Profiling and Energy Efficient Incentives in Mobile Crowd-Sensing | |
Jorns | Privacy in location-based services | |
Cheng | Investigating Privacy Leakage in Mobile Wireless Networks | |
Vaidyanathan | Manikarnika: Proactive Crowd-Sourcing for Location Based Services | |
Post et al. | Location is Everything |