Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and ...
详细信息
privacy-preserving data mining aims at discovering beneficial information from a large amount of data without violating the privacy policy. privacy-preserving association rules mining research has already generated ma...
详细信息
ISBN:
(纸本)9781605588162
privacy-preserving data mining aims at discovering beneficial information from a large amount of data without violating the privacy policy. privacy-preserving association rules mining research has already generated many interesting results. Based on commutative encryptions and the Secure Multi-party Computation (SMC) theory, Kantarcioglu and Clifton [1] propose two protocols to implement privacy-preserving mining of association rules over horizontally partitioned data. the paper addresses its incorrect security proof and introduces a more well-founded proof. this paper also identifies several other errors in [1]. this kind of protocols and their proof are a concrete application of Secure Multi-party Computation, which is be of great significances to the privacy-preserving data mining studies based on SMC. thus establishment of the correct proof methodology is important. this paper demonstrates the correct proof methodology by correcting the fault proof in [1]. Copyright 2009 acm.
Withthe growing use of the Internet, users need to reveal an increasing amount of private information when accessing online services, and, with growing integration, this information is shared among services. Although...
详细信息
ISBN:
(纸本)9783642008429
Withthe growing use of the Internet, users need to reveal an increasing amount of private information when accessing online services, and, with growing integration, this information is shared among services. Although progress was achieved in acknowledging the need to design privacy-friendly systems and protocols, there are still no satisfactory technical privacy-protecting solutions that reliably enforce user-defined flexible privacy policies. Today, the users can assess and analyze privacy policies of data controllers, but they cannot control access to and usage of their private data beyond their own computing environment. In this paper, we propose a conceptual framework for user-controlled formal privacy policies and examine elements of its design and implementation. In our vision, a Trusted Personal Information Wallet manages private data according to a user-defined privacy policies. We build on Trusted Virtual Domains (TVDs), leveraging trusted computing and virtualization to construct privacy domains for enforcing the user's policy. We present protocols for establishing these domains, and describe the implementation of the building blocks of our framework. Additionally, a simple privacy policy for trusted privacy domains functioning between different organizations and entities across networks is described as an example. Finally, we identify future research challenges in this area.
the widespread diffusion of the Internet as the platform for accessing distributed services makes available a huge amount of personal data, and a corresponding concern and demand from users, as well as legislation, fo...
详细信息
ISBN:
(纸本)9781605587875
the widespread diffusion of the Internet as the platform for accessing distributed services makes available a huge amount of personal data, and a corresponding concern and demand from users, as well as legislation, for solutions providing users with form of control on their data. Responding to this requirement raises the emerging need of solutions supporting proper information security governance, allowing enterprises managing user information to enforce restrictions on information acquisition as well as its processing and secondary use. While the research community has acknowledged this emerging scenario, and research efforts are being devoted to it, current technologies provide still limited solutions to the problem. In this paper, we illustrate our effort in pursuing the goal of bringing information security governance restrictions deployable in current organizational contexts. Considering the large success and application of XacmL, we extend the XacmL architecture and modules complementing them with functionalities for effective credential-based management and privacy support. Our proposal combines XacmL with PRIME, a novel solution supporting privacy-aware access control, resulting in an infrastructure that provides the flexible access functionality of XacmL enriched withthe data governance and privacy features of PRIME. Copyright 2009 acm.
Moving towards network convergence, a highly complex identity environment is emerging due to the heterogeneity of protocols, networks and devices as well as user requirements. the diversity of names and identities oft...
详细信息
ISBN:
(纸本)9781424428465
Moving towards network convergence, a highly complex identity environment is emerging due to the heterogeneity of protocols, networks and devices as well as user requirements. the diversity of names and identities often representing unassociated information and carrying different amount of securitydata, complicates the design of an identity management system. Existing solutions deal only with a small range of the identity issues, often imposing modifications in existing network procedures. this paper proposes a new independent identity management and discovery framework that links and manages internally all different types of identities while it is agnostic to existing naming formats, thus leaving existing current network procedures unaffected.
the proceedings contain 58 papers. the topics discussed include: security-oriented program transformations;security policy testing via automated program code generation;long term data storage issues for situational aw...
ISBN:
(纸本)9781605585185
the proceedings contain 58 papers. the topics discussed include: security-oriented program transformations;security policy testing via automated program code generation;long term data storage issues for situational awareness;ontology-based security assessment for software products;debugging support for security properties of software architectures;on building secure SCADA systems using security patterns;defending financial infrastructures through early warning systems: the intelligence cloud approach;JigDFS in container communities for international cargo security;automatic image analysis process for the detection of concealed weapons;a distributed reinforcement learning approach to mission survivability in tactical MANETs;detecting overflow vulnerabilities using automated verification;privacy-preserving multi-dimensional credentialing using veiled certificates;and decision dependability and its application to identity management.
In empirical disciplines, data sharing leads to verifiable research and facilitates future research studies. Recent efforts of the PROMISE community contributed to data sharing and reproducible research in software en...
详细信息
Recently, privacy issues have becomes important in data mining, especially when data is horizontally or vertically partitioned. For the vertically partitioned case, many data mining problems call be reduced to securel...
详细信息
ISBN:
(纸本)9783642033476
Recently, privacy issues have becomes important in data mining, especially when data is horizontally or vertically partitioned. For the vertically partitioned case, many data mining problems call be reduced to securely computing the scalar product. Among these problems, we call mention association rule mining over vertically partitioned data. Efficiency of a secure scalar product call be measured by the overhead of communication needed to ensure this security. Several solutions have been proposed for privacy preserving association rule mining in vertically partitioned data. But the main drawback of these solutions is the excessive overhead communication needed for ensuring dataprivacy. Ill this paper we propose a new secure scalar product withthe aim to reduce the overhead communication.
the proceedings contain 69 papers. the topics discussed include: an extensible XacmL authorization web service: application to dynamic web sites access control;indexing skills developed by learning objects based on th...
ISBN:
(纸本)9780769539591
the proceedings contain 69 papers. the topics discussed include: an extensible XacmL authorization web service: application to dynamic web sites access control;indexing skills developed by learning objects based on three educational taxonomies;privacy preserving risk assessment of credit securities;efficient combination of multiple hyperspectral data processing chains using binary decision trees;measurements of high-gain antennas at thz frequencies;a phase conjugating array for spectrally efficient wireless signal retransmission;and conceptualization in state machines, statecharts, and flow model.
k-Nearest Neighbor (k-NN) mining aims to retrieve the k most similar objects to the query objects. It can be incorporated into many data mining algorithms, Such as outlier detection, clustering, and k-NN classificatio...
详细信息
ISBN:
(纸本)9783642033476
k-Nearest Neighbor (k-NN) mining aims to retrieve the k most similar objects to the query objects. It can be incorporated into many data mining algorithms, Such as outlier detection, clustering, and k-NN classification. privacy-preserving distributed k-NN is developed to address the issue while preserving the participants' privacy. Several two-party privacy-preserving k-NN mining protocols on horizontally partitioned data had been proposed, but they fail to deal withthe privacy issue when the number of the participating parties is greater than two. this paper proposes a set of protocols that can address the privacy issue when there are more than two participants. the protocols are devised withthe probabilistic public-key cryptosystem and the communicative cryptosystem as the core privacy-preserving infrastructure. the protocols' security is proved based on the Secure Multi-party Computation theory.
暂无评论