A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Minimizing Privacy Disclosure in Web Services Paradigm
2015
Procedia Computer Science
With the rapid growth and progress in deployment of web based applications and services, the business enterprises are eyeing for a many-fold increase in the number of clients. ...
In this paper, we suggest and explore the usage of a few novel mechanisms in which the service users can specify their privacy preferences to the service provider in order to carry out their service request ...
In ontology based approach for privacy preservation, the privacy requirements of service users can be integrated into the design process of web services and privacy constraints can be formally specified ...
doi:10.1016/j.procs.2015.04.215
fatcat:7qwbdlht3jhptcdbwuhphjfphu
Trust and Privacy Enabled Service Composition Using Social Experience
[chapter]
2010
IFIP Advances in Information and Communication Technology
Using our privacy inference model we, first, prune social network to hide privacy sensitive contents and, then, utilize a trust inference based algorithm to measure reputation score of each individual ...
Trustworthiness is defined in terms of service reputation extracted from user profiles. ...
[10] presented a policy based approach (WSTO) for selection of WSMO semantic Web services, Kuter and Golbeck [1] targeted OWL-S upper ontology and followed a reputation based approach for selecting ...
doi:10.1007/978-3-642-16283-1_26
fatcat:yptbheta2bhohowgw7brvtckla
Web Services Privacy Preserving Based on Negotiation and Certificate Authorities
2016
International Journal of Modern Education and Computer Science
In this paper, a proposed approach for web services privacy preserving is proposed. This approach is based on the negotiation, encryption, and certificate authorities as third parties. ...
To the best of our knowledge, in the current privacy preserving approaches for web services, there is no technique that uses the negotiation for credential generalization and substitution between the consumer ...
A set of these approaches concentrates on securing the Web services resources [6, 7] and the other approches are related to preserving privacy in Web services [4, 8, 9, 10, 11, 12, 13] . ...
doi:10.5815/ijmecs.2016.10.07
fatcat:ojhqxxo75fd4bkmxxxkvje3zrm
Privacy on the web: facts, challenges, and solutions
2003
IEEE Security and Privacy
In the US, the regulatory approach to preserving privacy is reactive and not based on a national privacy policy. ...
The reputation-based approach consists of deploying mechanisms through which agents can accurately predict services' "conduct" with regard to preserving the privacy of personal information that they exchange ...
Membership is open to all IEEE members, affiliate society members, and others interested in the computer field. ...
doi:10.1109/msecp.2003.1253567
fatcat:v7zxhx62nzesrn3h4ebomsir4e
A Privacy Preserving Reputation Protocol for Web Service Provider Selection
2011
2011 IEEE 35th Annual Computer Software and Applications Conference Workshops
We present a privacy preserving reputation protocol that enables web service consumers to provide feedback about web service providers in a private and thus uninhibited manner. ...
However, it has been observed that users of a reputation system often hesitate in providing truthful feedback, mainly due to the fear of reprisal from target entities. ...
Privacy Preserving Reputation Protocol We adopt the Ideal-Real approach [15] , [16] to define a privacy preserving reputation protocol. ...
doi:10.1109/compsacw.2011.74
dblp:conf/compsac/HasanBD11
fatcat:5ks4pbmqdzcmzkyyamtt52kpum
Privacy Preserving Architectures for Collaborative Intrusion Detection
[article]
2016
arXiv
pre-print
In order to benefit from such global context of attacks, privacy concerns continue to be of major hindrance. ...
In this position paper we identify real world privacy problems as precise use cases, relevant cryptographic technologies and discuss privacy preserving architectures for collaborative intrusion detection ...
Acknowledgment We would like to thank Cisco Systems for supporting this work.
Privacy Preserving Architectures for Collaborative Intrusion Detection Position Paper ...
arXiv:1602.02452v1
fatcat:jt7nbcguebb5lie5llq37i7pwq
A Framework of Privacy Preserving QOS Prediction used for Web Service Recommendation
2015
International Journal of Science and Research (IJSR)
Then, based on the collected QoS data, a collaborative filtering approach is designed to calculate Web service QoS. ...
We propose a randomized disconcertion technique to safeguard user's privacy while still constructing accurate recommendations. ...
Privacy is also of energetic importance to the appreciation of QoS-based Web service recommendation.
Privacy Preserving Techniques 1. ...
doi:10.21275/v4i12.nov152541
fatcat:szsn4f5tbjdgxmt7zc2d24bd3q
A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case
2013
2013 IEEE International Congress on Big Data
We also discuss the ongoing EU-funded EEXCESS project as a concrete example of constructing user profiles with big data techniques and the approaches being considered for preserving user privacy. ...
User profiling is the process of collecting information about a user in order to construct their profile. ...
User profiling is the process of collecting information about a user in order to construct their user profile. User profiles are utilized by a variety of web based services for different purposes. ...
doi:10.1109/bigdata.congress.2013.13
dblp:conf/bigdata/HasanHBBD13
fatcat:dp4sc7wak5a2notvfwpessykjy
Security and Privacy Challenges in Open and Dynamic Environments
2006
Computer
COMPUTATIONAL POLICIES While clients, services, and mediators in distributed systems are physically separate and subject to disconnection, most security and privacy in a Semantic Web language, thereby ...
Developers could use a declarativepolicy-based approach to describe the ideal behavioral norms of entities in such environments in a machineunderstandable specification language. ...
Available as immediately downloadable PDFs (with a credit card purchase), ReadyNotes are here now at http://computer.org/readynotes. ...
doi:10.1109/mc.2006.207
fatcat:jqk6p23ixreuremqqj46cbizcm
Participatory Sensing: The Tension Between Social Translucence and Privacy
[chapter]
2011
Trustworthy Internet
However, it is important to maintain this property, in order to support accountability on one hand and allow people gain reputation for their efforts on the other hand. ...
Unavoidably, this raises a lot of privacy concerns, as people are becoming sensors and give out a lot of personal information, like their location. ...
We took the approach of protecting user's privacy by anonymizing their data before submission to the service provider. ...
doi:10.1007/978-88-470-1818-1_12
fatcat:ofnhqnp67rhyjh3yvn7hwe3hly
Trust and reputation in and across virtual communities
2013
Proceedings of the 16th International Conference on Extending Database Technology - EDBT '13
In a dynamic world, a person or a service may be a member of multiple communities and valuable information can be gained by sharing reputation of members among communities. ...
In the second part of the tutorial, we present the CCR model for sharing reputation across virtual communities and address major privacy concerns related to it. ...
However in the real world, people consider interacting or getting a service from others (person, company, web site, etc.), based on the trust they have for them. ...
doi:10.1145/2452376.2452477
dblp:conf/edbt/Gal-OzG13
fatcat:trwmxr2d3veqbj3sdvpsnzcqay
Privacy-Enhanced Web Service Composition
2014
IEEE Transactions on Services Computing
We also propose a privacy-preserving DaaS composition approach allowing to verify the compatibility between privacy requirements and policies in DaaS composition. ...
Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. ...
ACKNOWLEDGMENT The authors would like to thank: P. De Vettor for his contribution to the development of the experiments, and J. Fayn for her help in the realization of the scenarios. ...
doi:10.1109/tsc.2013.18
fatcat:hbatr6fimrfjdiu7klrqjgmpxq
Semantic Web: A Study on Web Service Composition Approaches
2017
International Journal of Trend in Scientific Research and Development
In a web service composition set of web services are collectively executed to achieve the objectives. ...
This study reveals the existing approaches used for web service composition in both syntactic and semantic environments. ...
makers.
9
Privacy based
1) Privacy Level
2) Privacy Rule
3) Privacy Policy
Mechanism:
Negotiation
Approaches:Privacy Preserving
DaaS composition [15]. ...
doi:10.31142/ijtsrd115
fatcat:357roz3n7bd6nikieush6glbsy
Privacy-Aware Web Service Composition and Ranking
2013
2013 IEEE 20th International Conference on Web Services
In this paper, we propose a novel privacypreserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users' privacy requirements and providers ...
Moreover, we present a possible Java-based implementation of the proposed approach and present an extension to WS-Policy standard to specify privacy related assertions. ...
CONCLUSIONS We have presented a novel approach to assist users and Web service providers in the composition and selection of composite services that are more privacy preserving. ...
doi:10.1109/icws.2013.27
dblp:conf/icws/CostantePZ13
fatcat:bkcrmhbn75e5rlik4znm5x7lra
Privacy-Aware Web Service Composition and Ranking
2013
International Journal of Web Services Research
In this paper, we propose a novel privacypreserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users' privacy requirements and providers ...
Moreover, we present a possible Java-based implementation of the proposed approach and present an extension to WS-Policy standard to specify privacy related assertions. ...
CONCLUSIONS We have presented a novel approach to assist users and Web service providers in the composition and selection of composite services that are more privacy preserving. ...
doi:10.4018/ijwsr.2013070101
fatcat:6u5y5mnugrfwzllgvtcnv3mflm
« Previous
Showing results 1 — 15 out of 13,822 results