Seničar et al., 2003 - Google Patents
Privacy-enhancing technologies—approaches and developmentSeničar et al., 2003
View PDF- Document ID
- 2273194923686843144
- Author
- Seničar V
- Jerman-Blažič B
- Klobučar T
- Publication year
- Publication venue
- Computer Standards & Interfaces
External Links
Snippet
In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection with data content transfer …
- 230000018109 developmental process 0 title description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Seničar et al. | Privacy-enhancing technologies—approaches and development | |
Deng et al. | A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements | |
Romanosky et al. | Privacy patterns for online interactions | |
Bouguettaya et al. | Privacy on the Web: facts, challenges, and solutions | |
Trèek | An integral framework for information systems security management | |
KR20050085233A (en) | Method for ensuring privacy in electronic transactions with session key blocks | |
Foukia et al. | PISCES: A framework for privacy by design in IoT | |
Sengupta et al. | e-Commerce security—A life cycle approach | |
Gritzalis | Embedding privacy in IT applications development | |
Herzberg et al. | Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
Mont et al. | Towards accountable management of privacy and identity information | |
Wright | Security, privacy, and anonymity | |
Tan et al. | M-commerce security: the impact of wireless application protocol (WAP) security services on e-business and e-health solutions | |
Borking | Privacy incorporated software agent (pisa): proposal for building a privacy guardian for the electronic age | |
Botha | Managing e-commerce | |
Claessens et al. | A tangled world wide web of security issues | |
Vasileva | Application of a human-centric approach in security by design for IoT architecture development | |
Chattopadhyay et al. | Mobile agent security against malicious hosts: A survey | |
Breeding | Key Technologies with Implications for Privacy: Encryption, Analytics, and Advertising Tracking | |
Lindskog et al. | Web Site Privacy with P3P | |
Seničar et al. | Privacy-enhancing technologies | |
Gritzalis et al. | Pythia: Towards anonymity in authentication | |
Zhu et al. | User agent and privacy compromise | |
Jaya Mabel Rani et al. | Data Leakage Prevention and Detection Techniques Using Internet Protocol Address |