[go: up one dir, main page]

Seničar et al., 2003 - Google Patents

Privacy-enhancing technologies—approaches and development

Seničar et al., 2003

View PDF
Document ID
2273194923686843144
Author
Seničar V
Jerman-Blažič B
Klobučar T
Publication year
Publication venue
Computer Standards & Interfaces

External Links

Snippet

In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection with data content transfer …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Similar Documents

Publication Publication Date Title
Seničar et al. Privacy-enhancing technologies—approaches and development
Deng et al. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Romanosky et al. Privacy patterns for online interactions
Bouguettaya et al. Privacy on the Web: facts, challenges, and solutions
Trèek An integral framework for information systems security management
KR20050085233A (en) Method for ensuring privacy in electronic transactions with session key blocks
Foukia et al. PISCES: A framework for privacy by design in IoT
Sengupta et al. e-Commerce security—A life cycle approach
Gritzalis Embedding privacy in IT applications development
Herzberg et al. Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Mont et al. Towards accountable management of privacy and identity information
Wright Security, privacy, and anonymity
Tan et al. M-commerce security: the impact of wireless application protocol (WAP) security services on e-business and e-health solutions
Borking Privacy incorporated software agent (pisa): proposal for building a privacy guardian for the electronic age
Botha Managing e-commerce
Claessens et al. A tangled world wide web of security issues
Vasileva Application of a human-centric approach in security by design for IoT architecture development
Chattopadhyay et al. Mobile agent security against malicious hosts: A survey
Breeding Key Technologies with Implications for Privacy: Encryption, Analytics, and Advertising Tracking
Lindskog et al. Web Site Privacy with P3P
Seničar et al. Privacy-enhancing technologies
Gritzalis et al. Pythia: Towards anonymity in authentication
Zhu et al. User agent and privacy compromise
Jaya Mabel Rani et al. Data Leakage Prevention and Detection Techniques Using Internet Protocol Address