Results 1 - 10
of
28,873
Privacy Enhancing Technologies for the Internet
- In COMPCON ’97
, 1997
"... In 1997 with Wagner and Brewer, and again in 2002, we looked at the then-current state of privacy-enhancing technologies (PETs) for the Internet. [27, 26] Now, in 2007, we take a third look. Technologies to help users maintain their privacy online are as important today as ever before—if not more so ..."
Abstract
-
Cited by 10 (2 self)
- Add to MetaCart
In 1997 with Wagner and Brewer, and again in 2002, we looked at the then-current state of privacy-enhancing technologies (PETs) for the Internet. [27, 26] Now, in 2007, we take a third look. Technologies to help users maintain their privacy online are as important today as ever before—if not more
Privacy-enhancing technologies for the Internet
"... The increased use of the Internet for everyday activities is bringing new threats to personal privacy. This paper gives an overview of existing and potential privacyenhancing technologies for the Internet, as well as motivation and challenges for future work in this field. ..."
Abstract
-
Cited by 129 (5 self)
- Add to MetaCart
The increased use of the Internet for everyday activities is bringing new threats to personal privacy. This paper gives an overview of existing and potential privacyenhancing technologies for the Internet, as well as motivation and challenges for future work in this field.
Teaching Privacy-Enhancing Technologies
- PROCEEDINGS OF IFIP/SEC 97, LNCS
"... This paper discusses the increasing relevance of privacy-enhancing technologies (PET) and the importance of teaching PET within IT-security curricula. A structure for a PET course is presented, which can be used for designing PET overview courses or PET introductory lectures. A suggested applica ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This paper discusses the increasing relevance of privacy-enhancing technologies (PET) and the importance of teaching PET within IT-security curricula. A structure for a PET course is presented, which can be used for designing PET overview courses or PET introductory lectures. A suggested
Privacy Enhancing Technologies
"... Information privacy is a very subjective and context sensitive area of research open to many interpretations. As such it has seen an increasing number of solutions proposed that address the issue of privacy protection. What is missing is a way of classifying the level of protection these privacy pro ..."
Abstract
- Add to MetaCart
protecting solutions provide. This paper addresses this problem by firstly defining the computational view of Information Privacy. Within this view three levels of privacy protection are defined and applied to a number of Privacy Enhancing Technologies that are in use today or in current development
A.: Privacy-enhancing technologies
- Social and Organizational Liabilities in Information Security. IGI Global
, 2009
"... Privacy-enhancing technologies (PETs), which constitute a wide array of technical means for protecting users ’ privacy, have gained considerable momentum in both academia and industry. However, existing surveys of PETs fail to delineate what sorts of privacy the described technologies enhance, which ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
Privacy-enhancing technologies (PETs), which constitute a wide array of technical means for protecting users ’ privacy, have gained considerable momentum in both academia and industry. However, existing surveys of PETs fail to delineate what sorts of privacy the described technologies enhance
Evaluation of Privacy Enhancing Technologies
"... burg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The ..."
Abstract
- Add to MetaCart
necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Privacy Enhanced Technologies: Methods - Markets - Misuse
- In: Lecture Notes in Computer Science, Proceedings of 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus
"... Abstract. Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technolo-gies. The question arises if there is a market for Privacy Enhanced Tech-nology. The ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract. Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technolo-gies. The question arises if there is a market for Privacy Enhanced Tech-nology
A layered architecture for privacy-enhancing technologies
- South African Computer Journal
, 2003
"... While a number of privacy-enhancing technologies have been proposed over the past quarter century, very little has been done to generalise the notion. Privacy-enhancing technologies have typically been discussed for specific applications (such as confidential and/or anonymous e-mail) or in specific ..."
Abstract
-
Cited by 7 (5 self)
- Add to MetaCart
While a number of privacy-enhancing technologies have been proposed over the past quarter century, very little has been done to generalise the notion. Privacy-enhancing technologies have typically been discussed for specific applications (such as confidential and/or anonymous e-mail) or in specific
Uniting Legislation with RFID Privacy-Enhancing Technologies
"... RFID is a popular identification and automation technology with serious security and privacy threats. Legislation expounds upon the actual security and privacy needs of people in RFID-enabled environments, while technology helps to ensure legal compliance. This paper examines the main aims of RFID p ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
privacy legislation, and explains how to achieve them using RFID privacy-enhancing technologies. The discussion reveals that multiple RFID privacyenhancing technologies must be combined and coordinated to achieve the protection of an individual. People currently do not have a tool that allows them to do
vPETs: Privacy Enhancing Technologies
"... La sécurité des réseaux s’améliore vLégislation (mars 2000) sur les signatures électroniques-> IGC (PKI) vIP-Sec-> IPv6 vProgrès de la détection d’intrusions … mais croissance des menaces vDDoS vFraude dans l’e-Commerce vCriminalité transfrontière v … et les failles sont nombreuses! … d’où enc ..."
Abstract
- Add to MetaCart
La sécurité des réseaux s’améliore vLégislation (mars 2000) sur les signatures électroniques-> IGC (PKI) vIP-Sec-> IPv6 vProgrès de la détection d’intrusions … mais croissance des menaces vDDoS vFraude dans l’e-Commerce vCriminalité transfrontière v … et les failles sont nombreuses! … d’où encore plus de sécurité vFiltrage à la source v“Traçabilité” o FAI o Serveurs vDanger pour la vie privée
Results 1 - 10
of
28,873