Filters








201,818 Hits in 3.9 sec

Privacy Enhancing Technologies

S.A. Weis
2006 IEEE Security and Privacy  
This Privacy-Enhancing Technologies PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/06/$20.00 © 2006 IEEE ■ IEEE SECURITY & PRIVACY STEPHEN A. WEIS Independent Consultant T  ...  Contact him at sw@saweis.net. he sixth annual Workshop on Privacy Enhancing Technologies (PET) was held in Cambridge, England, from 28-30 June 2006.  ... 
doi:10.1109/msp.2006.130 fatcat:w4wtulptzjhazc4akgogwhajbq

Privacy-Enhancing Technologies [chapter]

2001 Lecture Notes in Computer Science  
Privacy-enhancing technologies (PETs), which constitute a wide array of technical means for protecting users' privacy, have gained considerable momentum in both academia and industry.  ...  However, existing surveys of PETs fail to delineate what sorts of privacy the described technologies enhance, which makes it difficult to differentiate between the various PETs.  ...  Privacy-enhancing technologies (PETs), which constitute a wide array of technical means for protecting users' privacy, have gained considerable momentum in both academia and industry.  ... 
doi:10.1007/3-540-45150-1_4 fatcat:ztn5higeqbcx3k2kludg54vesy

Privacy-Enhancing Technologies [chapter]

Kent Seamons
2021 Modern Socio-Technical Perspectives on Privacy  
Privacy-enhancing technologies can control access to sensitive information to prevent or limit privacy violations.  ...  This chapter discusses the primary privacy-enhancing technologies that the usable security research community has analyzed and identifies issues, recommendations, and future research directions.  ...  Technologies Privacy-Enhancing Technologies Privacy-Enhancing Technologies Privacy-Enhancing Technologies Privacy-Enhancing Technologies Privacy-Enhancing Technologies Privacy-Enhancing  ... 
doi:10.1007/978-3-030-82786-1_8 fatcat:2hciujom6rawxgbhpuahtxfv6i

Privacy Enhancing Technologies: A Review [chapter]

John Argyrakis, Stefanos Gritzalis, Chris Kioulafas
2003 Lecture Notes in Computer Science  
There is no commonly accepted definition of Privacy Enhancing Technologies (PETs), although a good description is provided by UK Information Commissioner's Office as "... any technologies that protect  ...  Other work has focused on extension of access control and related privacy-enhanced policies.  ... 
doi:10.1007/10929179_51 fatcat:fx47fz4oazhqtm5atntgdck2ni

Reputation in privacy enhancing technologies

Roger Dingledine, Nick Mathewson, Paul Syverson
2002 Proceedings of the 12th annual conference on Computers, freedom and privacy - CFP '02  
While reputation might superficially seem inimical to privacy concerns, systems with explicit reputation can actually enable privacy by controlling the flow of information about pseudonymous individuals  ...  We have already seen how reputation can enhance privacy. Can we go one step farther, and assign reputation based on an expectation of protecting privacy?  ...  A privacy destroying adversary might offer very reliable service while using information from various compromised system elements to compromise privacy.  ... 
doi:10.1145/543505.543507 fatcat:jn4kkeji3nbufe2lru2e4iuycm

Reputation in privacy enhancing technologies

Roger Dingledine, Nick Mathewson, Paul Syverson
2002 Proceedings of the 12th annual conference on Computers, freedom and privacy - CFP '02  
While reputation might superficially seem inimical to privacy concerns, systems with explicit reputation can actually enable privacy by controlling the flow of information about pseudonymous individuals  ...  We have already seen how reputation can enhance privacy. Can we go one step farther, and assign reputation based on an expectation of protecting privacy?  ...  A privacy destroying adversary might offer very reliable service while using information from various compromised system elements to compromise privacy.  ... 
doi:10.1145/543482.543507 fatcat:4yh7ggxeynhq5nmpxvqkriso4m

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective [article]

Alexandros Mittos and Bradley Malin and Emiliano De Cristofaro
2018 arXiv   pre-print
In this paper, we rely on a structured methodology to contextualize and provide a critical analysis of the current knowledge on privacy-enhancing technologies used for testing, storing, and sharing genomic  ...  However, this also prompts a number of security and privacy concerns stemming from the distinctive characteristics of genomic data.  ...  on "Enabling Progress in Genomic Research via Privacy-Preserving Data Sharing," and a grant from the National Institutes of Health (5RM1HG009034).  ... 
arXiv:1712.02193v2 fatcat:2pdqmdfv3nhfjbuyn3kwmudija

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

Alexandros Mittos, Bradley Malin, Emiliano De Cristofaro
2019 Proceedings on Privacy Enhancing Technologies  
In this paper, we rely on a structured methodology to contextualize and provide a critical analysis of the current knowledge on privacy-enhancing technologies used for testing, storing, and sharing genomic  ...  However, this also prompts a number of security and privacy concerns stemming from the distinctive characteristics of genomic data.  ...  on "Enabling Progress in Genomic Research via Privacy-Preserving Data Sharing," and a grant from the National Institutes of Health (5RM1HG009034).  ... 
doi:10.2478/popets-2019-0006 dblp:journals/popets/MittosMC19 fatcat:tpyb3occmfa77f3dk5lroe2i6m

Privacy Enhanced Technologies: Methods – Markets – Misuse [chapter]

Hannes Federrath
2005 Lecture Notes in Computer Science  
Research in Privacy Enhancing Technologies has a tradition of about 25 years.  ...  The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it profitable.  ...  John Borking can be considered as the creator of the term "Privacy Enhancing Technology (PET)" when he invented the Identity Protector [2] .  ... 
doi:10.1007/11537878_1 fatcat:od4quubqbzfnzoa74hrvqit3wa

Privacy-Enhancing Technologies for Internet Commerce

L. Jean Jean Camp, Carlos A Osorio
2002 Social Science Research Network  
We examine privacy-enhancing technologies based on the consistency of the business plans, technology, stated objectives, and the concept of privacy as embedded in the technologies.  ...  We use these trust models to segment the privacy market and classify the privacy-enhancing technologies.  ...  Autonomy-Enhancing Technologies The autonomy-enhancing technologies offer the user the ability to access information without surveillance.  ... 
doi:10.2139/ssrn.329282 fatcat:6nbjwrzkpnasjfw4326exzftvi

Privacy-Enhancing Technologies For Internet Commerce [chapter]

L. Jean Camp, Carlos A. Osorio
2003 Trust in the Network Economy  
We examine privacy-enhancing technologies based on the consistency of the business plans, technology, stated objectives, and the concept of privacy as embedded in the technologies.  ...  We use these trust models to segment the privacy market and classify the privacy-enhancing technologies.  ...  Autonomy-Enhancing Technologies The autonomy-enhancing technologies offer the user the ability to access information without surveillance.  ... 
doi:10.1007/978-3-7091-6088-6_19 fatcat:pds5x36eyjadpm2tpuea6olxbm

The Status of Privacy Enhancing Technologies [chapter]

John Borking
2003 IFIP Advances in Information and Communication Technology  
This paper explains Privacy-Enhancing Technologies (PETs), their anchoring in the EU Data Protection Directives and other data-protection systems, and how they might contribute to the lawful processing  ...  The EU project PISA (privacy incorporated software agent) will be used as an example of future PET.  ...  The vocabulary of P3P 38 I.Goldberg, Privacy-enhancing technologies for the Internet, II: five years later, in Preproceedings of the 2 nd workshop on privacy Enhancing technologies, San Francisco, April  ... 
doi:10.1007/978-0-387-35696-9_15 fatcat:vus2qtodobeuvemfbenyvkrlam

PETchain: A Blockchain based Privacy Enhancing Technology

Ibrahim Tariq Javed, Fares Alharbi, Tiziana Margaria, Noel Crespi, Kashif Naseer Qureshi
2021 IEEE Access  
INDEX TERMS Blockchain, Ethereum, privacy enhancing technology, privacy preservation, smartcontract.  ...  In this paper, we present PETchain: a novel privacy enhancing technology using blockchain and smartcontract.  ...  TABLE 5 . 5 Comparison of privacy enhancing technologies.  ... 
doi:10.1109/access.2021.3064896 fatcat:xprbzm6lwbay5kljy777ri4kgu

Privacy Enhancing Technologies for Wireless Sensor Networks [chapter]

Chi-Yin Chow, Wenjian Xu, Tian He
2013 Signals and Communication Technology  
In this chapter, we discuss existing privacy enhancing technologies designed for protecting system privacy, data privacy and context privacy in wireless sensor networks (WSNs).  ...  To help researchers to understand the stateof-the-art privacy enhancing technologies for WSNs, we category them into three main types of privacy, namely, system privacy, data privacy, and context privacy  ...  Fig. 16 16 Probabilistic Privacy Enhancing Technologies for Wireless Sensor Networks  ... 
doi:10.1007/978-3-642-40009-4_18 fatcat:acvd2cqeojazrk74x7jllyvpj4

On the Adoption of Privacy-enhancing Technologies [chapter]

Tristan Caulfield, Christos Ioannidis, David Pym
2016 Lecture Notes in Computer Science  
of privacy-enhancing technologies.  ...  used; requirement, the level of privacy that the technology must provide for an agent to be willing to use the technology in a given context; belief, an agent's perception of the level of privacy provided  ...  Modelling privacy The basic approach of the model as described in Section 2 is not adequate for modelling the adoption of privacy-enhancing technologies.  ... 
doi:10.1007/978-3-319-47413-7_11 fatcat:kshtgi6gyjh75ors4cwcdcs6mi
« Previous Showing results 1 — 15 out of 201,818 results