Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have successfully been used to refine models of...
详细信息
ISBN:
(纸本)9781605582917
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have successfully been used to refine models of user preferences, such as in recommender systems, they are generally configured as "black boxes" that take control over the entire policy and severely restrict the ways in which the user can manipulate it. this article presents an alternative approach, referred to as user-controllable policy learning. It involves the incremental manipulation of policies in a context where system and user refine a common policy model. the user regularly provides feedback on decisions made based on the current policy. this feedback is used to identify (learn) incremental policy improvements which are presented as suggestions to the user. the user, in turn, can review these suggestions and decide which, if any, to accept. the incremental nature of the suggestions enhances usability, and because the user and the system manipulate a common policy representation, the user retains control and can still make policy modifications by hand. Results obtained using a neighborhood search implementation of this approach are presented in the context of data derived from the deployment of a friend finder application, where users can share their locations with others, subject to privacy policies they refine over time. We present results showing policy accuracy, which averages 60% upon initial definition by our users, climbing as high as 90% using our technique. Copyright 2008 acm.
security and privacy issues in healthcare data management play a fundamental role in the widespread adoption of medical information systems. As a consequence, it is very important to define the right means for express...
详细信息
ISBN:
(纸本)9781605580425
security and privacy issues in healthcare data management play a fundamental role in the widespread adoption of medical information systems. As a consequence, it is very important to define the right means for expressing and managing policies in order to comply withprivacy-related standards and regulations. In this work, we extend an open source hospital information system in order to provide support for expressing and enforcing privacy-related policies, using as a starting point a conceptual model the authors developed in a previous work. Copyright 2008 acm.
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. they are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sens...
详细信息
ISBN:
(纸本)9780769534930
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. they are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sensor networks are vulnerable to security attack such as sinkhole attack, wormhole attack, and simple power exhaustion attack. However, wireless sensor networks must be secured from obstructing the delivery of correct sensor data and from forging sensor data. the security and privacy problem related to wireless sensor network's application has become a serious issue in the real service environment. In this paper, we propose our management platform and security framework for wireless sensor networks. the proposed framework has advantages as regards secure association and intrusion detection. Furthermore, the proposed mechanism can be applied to ubiquitous application such as u-city, u-healthcare, u-defense as a secure wireless sensor network management platform.
Withthe emerging embedding of the sensor networks into the pervasive environment, our capabilities on location information gathering and processing have been greatly improved. Although this information is very useful...
详细信息
ISBN:
(纸本)9780769534923
Withthe emerging embedding of the sensor networks into the pervasive environment, our capabilities on location information gathering and processing have been greatly improved. Although this information is very useful, it also brings great challenges for protecting the privacy. Currently, most research efforts focus oil protecting current location, and ignore the internal relationship among the successive locations. To date, there are many techniques to infer a location when the related successive information is published, and which bring in serious privacy and security concerns. In this paper, we Jar the first time consider this kind of relationship, and identify a novel successive privacythreat. We then formulate a generic model for protecting the successive privacy. Under this model, there is a trade-off between the number of data to be published and the privacy protecting level, and which brings a novel maximum publishable location privacy problem. As this problem is intractable, we develop several heuristics. Extensive simulations demonstrate the effectiveness of our schemes.
Steganographic file systems are file systems where the location and even the existence of files are unknown to the users not having stored them. If the file system can be written to by several users, a user may inadve...
详细信息
ISBN:
(纸本)9783540882688
Steganographic file systems are file systems where the location and even the existence of files are unknown to the users not having stored them. If the file system can be written to by several users, a user may inadvertently damage the files stored by other users. In this paper, solutions to the collision problem are proposed which rely on error-correcting codes. the storage efficiency and the privacy offered by the proposed protocols are analytically assessed.
the proceedings contain 21 papers. the topics discussed include: toward elucidating language functions in the brain;privacy-preserving similarity evaluation and application to remote biometrics authentication;suitabil...
ISBN:
(纸本)3540882685
the proceedings contain 21 papers. the topics discussed include: toward elucidating language functions in the brain;privacy-preserving similarity evaluation and application to remote biometrics authentication;suitability maps based on the LSP method;aggregated mean ratios of an interval induced from aggregation operations;WOWA enhancement of the preference modeling in the reference point method;uninorms and non-contradiction;Choquet Stieltjes integral, Losonczi's means and OWA operators;the polytope of Fuzzy measures and its adjacency graph;on consensus measures in Fuzzy group decision making;SBM and bipolar models in data envelopment analysis with interval data;a linear-time multivariate micro-aggregation for privacy protection in uniform very large data sets;and improving microaggregation for complex record anonymization.
this book constitutes the refereed proceedings of the 5th International conference on Trust and privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. the 18...
详细信息
ISBN:
(数字)9783540857358
ISBN:
(纸本)9783540857341
this book constitutes the refereed proceedings of the 5th International conference on Trust and privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. the 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. the papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.
Trust management is a crucial approach to authenticate user and protect resource in distributed systems. Trust between two unknown parties in different autonomous domain is established based on the parties properties,...
详细信息
ISBN:
(纸本)9783540692942
Trust management is a crucial approach to authenticate user and protect resource in distributed systems. Trust between two unknown parties in different autonomous domain is established based on the parties properties, by which are proven their qualifications through the disclosure of appropriate credentials. Assertion, described as well-defined uniformly semantic structure entities such as credentials, policies and requests, is encrypted by issuer or authority's public key. In this paper, we propose an efficient assertion security protect model based on signcryption scheme for multiple autonomous domain managers and privacy key generators (PKGs). We proved its security including confidentiality, unforgeability, public verifiability, and ciphertext anonymity under the DBDH assumption in the random oracle model, where the proposed scheme has comparable advantage in security and efficiency to other previous ID-based signcryption schemes in multiple PKGs.
Rough set theory has been a powerful methodology in data mining and knowledge discovery, extracting and minimizing rules from decision tables. there are mainly two kinds of ways for knowledge discovery: the one is to ...
详细信息
ISBN:
(纸本)9780769533056
Rough set theory has been a powerful methodology in data mining and knowledge discovery, extracting and minimizing rules from decision tables. there are mainly two kinds of ways for knowledge discovery: the one is to get specialized knowledge from experts in this fields, the second is to provide automated analysis solutions from database. But there are few studies that focus on the knowledge discovery combing specialized knowledge with automatic knowledge analysis. In this paper, rough set methodology is extended with a heuristic research algorithm. this algorithm, based on the discernibility matrices, integrates the frequency and significance of the attributes and the contribution rate of the rules to subjective judgment. this algorithm can find out the attributes with relative high subjective values. It is especially of importance to controllable system, where the value can be affected by the subjective judgment. And this algorithm is applied in the empirical studies in information security management.
Hash Chains are widely used for entity authentication or data-origin authentication. However, finite length of a hash chain limits its implementations. A new kind of hash chain, called Self-Renewable Hash Chain (SRHC)...
详细信息
ISBN:
(纸本)9780769534923
Hash Chains are widely used for entity authentication or data-origin authentication. However, finite length of a hash chain limits its implementations. A new kind of hash chain, called Self-Renewable Hash Chain (SRHC) is proposed, which achieves a hash chain self-renewing or re-initialization smoothly, securely throughout its usage. the renewing process of SRHC does not need additional protocols or independent re-initialization processes and can be continued indefinitely to give rise to an infinite length hash chain. It also enhances security properties for conventional hash chain: fine-authentication and proactive updating etc. An application of SRHC - an improved 4-WAY protocol with SRHC for WLAN is presented that shows SRHC is available and practical.
暂无评论