Filters








13,822 Hits in 4.3 sec

Minimizing Privacy Disclosure in Web Services Paradigm

Rekha Bhatia, Manpreet Singh
2015 Procedia Computer Science  
With the rapid growth and progress in deployment of web based applications and services, the business enterprises are eyeing for a many-fold increase in the number of clients.  ...  In this paper, we suggest and explore the usage of a few novel mechanisms in which the service users can specify their privacy preferences to the service provider in order to carry out their service request  ...  In ontology based approach for privacy preservation, the privacy requirements of service users can be integrated into the design process of web services and privacy constraints can be formally specified  ... 
doi:10.1016/j.procs.2015.04.215 fatcat:7qwbdlht3jhptcdbwuhphjfphu

Trust and Privacy Enabled Service Composition Using Social Experience [chapter]

Shahab Mokarizadeh, Nima Dokoohaki, Mihhail Matskin, Peep Küngas
2010 IFIP Advances in Information and Communication Technology  
Using our privacy inference model we, first, prune social network to hide privacy sensitive contents and, then, utilize a trust inference based algorithm to measure reputation score of each individual  ...  Trustworthiness is defined in terms of service reputation extracted from user profiles.  ...  [10] presented a policy based approach (WSTO) for selection of WSMO semantic Web services, Kuter and Golbeck [1] targeted OWL-S upper ontology and followed a reputation based approach for selecting  ... 
doi:10.1007/978-3-642-16283-1_26 fatcat:yptbheta2bhohowgw7brvtckla

Web Services Privacy Preserving Based on Negotiation and Certificate Authorities

A. Meligy, Emad Elabd, Sahar Kotb
2016 International Journal of Modern Education and Computer Science  
In this paper, a proposed approach for web services privacy preserving is proposed. This approach is based on the negotiation, encryption, and certificate authorities as third parties.  ...  To the best of our knowledge, in the current privacy preserving approaches for web services, there is no technique that uses the negotiation for credential generalization and substitution between the consumer  ...  A set of these approaches concentrates on securing the Web services resources [6, 7] and the other approches are related to preserving privacy in Web services [4, 8, 9, 10, 11, 12, 13] .  ... 
doi:10.5815/ijmecs.2016.10.07 fatcat:ojhqxxo75fd4bkmxxxkvje3zrm

Privacy on the web: facts, challenges, and solutions

A. Rezgur, A. Bouguettaya, M.Y. Eltoweissy
2003 IEEE Security and Privacy  
In the US, the regulatory approach to preserving privacy is reactive and not based on a national privacy policy.  ...  The reputation-based approach consists of deploying mechanisms through which agents can accurately predict services' "conduct" with regard to preserving the privacy of personal information that they exchange  ...  Membership is open to all IEEE members, affiliate society members, and others interested in the computer field.  ... 
doi:10.1109/msecp.2003.1253567 fatcat:v7zxhx62nzesrn3h4ebomsir4e

A Privacy Preserving Reputation Protocol for Web Service Provider Selection

Omar Hasan, Lionel Brunie, Ernesto Damiani
2011 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops  
We present a privacy preserving reputation protocol that enables web service consumers to provide feedback about web service providers in a private and thus uninhibited manner.  ...  However, it has been observed that users of a reputation system often hesitate in providing truthful feedback, mainly due to the fear of reprisal from target entities.  ...  Privacy Preserving Reputation Protocol We adopt the Ideal-Real approach [15] , [16] to define a privacy preserving reputation protocol.  ... 
doi:10.1109/compsacw.2011.74 dblp:conf/compsac/HasanBD11 fatcat:5ks4pbmqdzcmzkyyamtt52kpum

Privacy Preserving Architectures for Collaborative Intrusion Detection [article]

Sashank Dara, V.N. Muralidhara
2016 arXiv   pre-print
In order to benefit from such global context of attacks, privacy concerns continue to be of major hindrance.  ...  In this position paper we identify real world privacy problems as precise use cases, relevant cryptographic technologies and discuss privacy preserving architectures for collaborative intrusion detection  ...  Acknowledgment We would like to thank Cisco Systems for supporting this work. Privacy Preserving Architectures for Collaborative Intrusion Detection Position Paper  ... 
arXiv:1602.02452v1 fatcat:jt7nbcguebb5lie5llq37i7pwq

A Framework of Privacy Preserving QOS Prediction used for Web Service Recommendation

2015 International Journal of Science and Research (IJSR)  
Then, based on the collected QoS data, a collaborative filtering approach is designed to calculate Web service QoS.  ...  We propose a randomized disconcertion technique to safeguard user's privacy while still constructing accurate recommendations.  ...  Privacy is also of energetic importance to the appreciation of QoS-based Web service recommendation. Privacy Preserving Techniques 1.  ... 
doi:10.21275/v4i12.nov152541 fatcat:szsn4f5tbjdgxmt7zc2d24bd3q

A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case

Omar Hasan, Benjamin Habegger, Lionel Brunie, Nadia Bennani, Ernesto Damiani
2013 2013 IEEE International Congress on Big Data  
We also discuss the ongoing EU-funded EEXCESS project as a concrete example of constructing user profiles with big data techniques and the approaches being considered for preserving user privacy.  ...  User profiling is the process of collecting information about a user in order to construct their profile.  ...  User profiling is the process of collecting information about a user in order to construct their user profile. User profiles are utilized by a variety of web based services for different purposes.  ... 
doi:10.1109/bigdata.congress.2013.13 dblp:conf/bigdata/HasanHBBD13 fatcat:dp4sc7wak5a2notvfwpessykjy

Security and Privacy Challenges in Open and Dynamic Environments

L. Kagal, T. Finin, A. Joshi, S. Greenspan
2006 Computer  
COMPUTATIONAL POLICIES While clients, services, and mediators in distributed systems are physically separate and subject to disconnection, most security and privacy in a Semantic Web language, thereby  ...  Developers could use a declarativepolicy-based approach to describe the ideal behavioral norms of entities in such environments in a machineunderstandable specification language.  ...  Available as immediately downloadable PDFs (with a credit card purchase), ReadyNotes are here now at http://computer.org/readynotes.  ... 
doi:10.1109/mc.2006.207 fatcat:jqk6p23ixreuremqqj46cbizcm

Participatory Sensing: The Tension Between Social Translucence and Privacy [chapter]

Ioannis Krontiris, Nicolas Maisonneuve
2011 Trustworthy Internet  
However, it is important to maintain this property, in order to support accountability on one hand and allow people gain reputation for their efforts on the other hand.  ...  Unavoidably, this raises a lot of privacy concerns, as people are becoming sensors and give out a lot of personal information, like their location.  ...  We took the approach of protecting user's privacy by anonymizing their data before submission to the service provider.  ... 
doi:10.1007/978-88-470-1818-1_12 fatcat:ofnhqnp67rhyjh3yvn7hwe3hly

Trust and reputation in and across virtual communities

Nurit Gal-Oz, Ehud Gudes
2013 Proceedings of the 16th International Conference on Extending Database Technology - EDBT '13  
In a dynamic world, a person or a service may be a member of multiple communities and valuable information can be gained by sharing reputation of members among communities.  ...  In the second part of the tutorial, we present the CCR model for sharing reputation across virtual communities and address major privacy concerns related to it.  ...  However in the real world, people consider interacting or getting a service from others (person, company, web site, etc.), based on the trust they have for them.  ... 
doi:10.1145/2452376.2452477 dblp:conf/edbt/Gal-OzG13 fatcat:trwmxr2d3veqbj3sdvpsnzcqay

Privacy-Enhanced Web Service Composition

Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed, Michael Mrissa
2014 IEEE Transactions on Services Computing  
We also propose a privacy-preserving DaaS composition approach allowing to verify the compatibility between privacy requirements and policies in DaaS composition.  ...  Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web.  ...  ACKNOWLEDGMENT The authors would like to thank: P. De Vettor for his contribution to the development of the experiments, and J. Fayn for her help in the realization of the scenarios.  ... 
doi:10.1109/tsc.2013.18 fatcat:hbatr6fimrfjdiu7klrqjgmpxq

Semantic Web: A Study on Web Service Composition Approaches

Michael Raj, TF, Siva Prakasam. P
2017 International Journal of Trend in Scientific Research and Development  
In a web service composition set of web services are collectively executed to achieve the objectives.  ...  This study reveals the existing approaches used for web service composition in both syntactic and semantic environments.  ...  makers. 9 Privacy based 1) Privacy Level 2) Privacy Rule 3) Privacy Policy Mechanism: Negotiation Approaches:Privacy Preserving DaaS composition [15].  ... 
doi:10.31142/ijtsrd115 fatcat:357roz3n7bd6nikieush6glbsy

Privacy-Aware Web Service Composition and Ranking

Elisa Costante, Federica Paci, Nicola Zannone
2013 2013 IEEE 20th International Conference on Web Services  
In this paper, we propose a novel privacypreserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users' privacy requirements and providers  ...  Moreover, we present a possible Java-based implementation of the proposed approach and present an extension to WS-Policy standard to specify privacy related assertions.  ...  CONCLUSIONS We have presented a novel approach to assist users and Web service providers in the composition and selection of composite services that are more privacy preserving.  ... 
doi:10.1109/icws.2013.27 dblp:conf/icws/CostantePZ13 fatcat:bkcrmhbn75e5rlik4znm5x7lra

Privacy-Aware Web Service Composition and Ranking

Elisa Costante, Federica Paci, Nicola Zannone
2013 International Journal of Web Services Research  
In this paper, we propose a novel privacypreserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users' privacy requirements and providers  ...  Moreover, we present a possible Java-based implementation of the proposed approach and present an extension to WS-Policy standard to specify privacy related assertions.  ...  CONCLUSIONS We have presented a novel approach to assist users and Web service providers in the composition and selection of composite services that are more privacy preserving.  ... 
doi:10.4018/ijwsr.2013070101 fatcat:6u5y5mnugrfwzllgvtcnv3mflm
« Previous Showing results 1 — 15 out of 13,822 results