TAILIEUCHUNG - Private and Trusted Interactions

Private and Trusted Interactions presents about Privacy and Trust, Fundamental Contributions, Proposals and Publications, Privacy in Data Dissemination, Problem of Privacy Preservation, Notification in Self-descriptive Objects, Optimization of Object Transmission. | Private and Trusted Interactions* Bharat Bhargava, Leszek Lilien, and Dongyan Xu {bb, llilien, dxu}@) Department of Computer Sciences, CERIAS† and CWSA‡ Purdue University in collaboration with . students and postdocs in the Raid Lab Computer Sciences Building, Room CS 145, phone: 765-494-6702 * Supported in part by NSF grants IIS-0209059, IIS-0242840, ANI-0219110, and Cisco URP grant. More grants are welcomed! † Center for Education and Research in Information Assurance and Security (Executive Director: Eugene Spafford) ‡ Center for Wireless Systems and Applications (Director: Catherine P. Rosenberg) Motivation Sensitivity of personal data [Ackerman et al. ‘99] 82% willing to reveal their favorite TV show Only 1% willing to reveal their SSN Business losses due to privacy violations Online consumers worry about revealing personal data This fear held back $15 billion in online revenue in 2001 Federal Privacy Acts to protect privacy ., Privacy Act of 1974 for federal agencies Still many examples of privacy violations even by federal agencies JetBlue Airways revealed travellers’ data to federal gov’t ., Health Insurance Portability and Accountability Act of 1996 (HIPAA) 3/23/04 Privacy and Trust Privacy Problem Consider computer-based interactions From a simple transaction to a complex collaboration Interactions involve dissemination of private data It is voluntary, “pseudo-voluntary,” or required by law Threats of privacy violations result in lower trust Lower trust leads to isolation and lack of collaboration Trust must be established Data – provide quality an integrity End-to-end communication – sender authentication, message integrity Network routing algorithms – deal with malicious peers, intruders, security attacks 3/23/04 Fundamental Contributions Provide measures of privacy and trust Empower users (peers, nodes) to control privacy in ad hoc environments Privacy of user identification Privacy of user .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.