Digital Privacy: Theory, Technologies, and PracticesAlessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati CRC Press, 22 dic 2007 - 496 pagine During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in academia, industry, and government. |
Sommario
ix | |
xiii | |
xv | |
xix | |
1 | |
3 | |
19 | |
Chapter 3 PrivacyPreserving Cryptographic Protocols | 47 |
Chapter 11 HCI Designs for PrivacyEnhancing Identity Management | 229 |
Chapter 12 Privacy Perceptions among Members of Online Communities | 253 |
Scales for Privacy in Ubiquitous Computing | 267 |
PRIVACY IN UBIQUITOUS COMPUTING | 283 |
Technolgical Issues and Privacy Concerns | 285 |
Chapter 15 PrivacEnhanced Location Services Information | 307 |
Privacy in Ubiquitous Computing Ubicomp | 327 |
THE ECONOMICS OF PRIVACY | 345 |
PRIVACY ATTACKS | 71 |
Chapter 4 Byzantine Attacks on Anonymity Systems | 73 |
Chapter 5 Introducing Traffic Analysis | 95 |
Chapter 6 Privacy Profiling Targeted Marketing and Data Mining | 117 |
PRIVACYENHANCING TECHNOLOGIES | 133 |
Chapter 7 Enterprise Privacy Policies and Languages | 135 |
Chapter 8 Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation | 155 |
Chapter 9 Privacy Protection with Uncertainty and Indistinguishability | 173 |
Chapter 10 PrivcyPreservation Techniques in Data Mining | 187 |
USER PRIVACY | 227 |
Chapter 17 A Risk Model for Privacy Insurance | 347 |
Chapter 18 What Can Behavioral Economics Teach Us about Privacy? | 363 |
PRIVACY AND POLICY | 379 |
Chapter 19 Privacy of Outsourced Data | 381 |
A Pandoras Box for Rights and Liberties? | 409 |
Freedom of Association in a Network Society | 435 |
Index | 459 |
Back cover | 471 |
Altre edizioni - Visualizza tutto
Digital Privacy: Theory, Technologies, and Practices Alessandro Acquisti,Stefanos Gritzalis,Costos Lambrinoudakis,Sabrina di Vimercati Anteprima non disponibile - 2007 |
Parole e frasi comuni
access control ACM Press adversary algorithm Alice and Bob anonymity applications association attack attributes B+ tree behavior client cluster Computer Science cryptographic data mining Data Protection Data Retention database decrypt defined distribution e-mail electronic encrypted evaluation example Fourth Amendment function hierarchy homomorphic encryption identify identity individual input interaction International Conference Internet key derivation location privacy location-based services methods Mix cascade Mixminion nodes obfuscation Onion Routing online communities outsourced participants party password path personal data personal information plaintext Pol1 Pol2 possible privacy concerns privacy policies privacy-enhancing privacy-preserving problem Proc proposed protocol proxy query random recipient remailer requirements result RFID RFID tags risk Roger Dingledine scenario scheme secure multiparty computation Security and Privacy sender server solution specific Symposium techniques tion traffic analysis traffic data tuples ubicomp Ubiquitous Computing user’s values
Brani popolari
Pagina 255 - It is imagined because the members of even the smallest nation will never know most of their fellow-members, meet them or even hear of them, yet in the minds of each lives the image of their communion...
Pagina 447 - Of course, it is immaterial whether the beliefs sought to be advanced by association pertain to political, economic, religious or cultural matters, and state action which may have the effect of curtailing the freedom to associate is subject to the closest scrutiny.
Pagina 447 - Effective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association, as this Court has more than once recognized by remarking upon the close nexus between the freedoms of speech and assembly. It is beyond debate that freedom to engage in association for the advancement of beliefs and ideas is an inseparable aspect of the "liberty...
Pagina 68 - Ninghui Li, John C. Mitchell, and William H. Winsborough. Design of a role-based trust management framework.
Pagina 65 - N00014-02-10364 from the Office of Naval Research, by sponsors of the Center for Education and Research in Information Assurance and Security, and by Purdue Discovery Park's eenterprise Center.
Pagina 254 - virtual communities are social aggregations that emerge from the Net when enough people carry on ... public discussions long enough, with sufficient human feeling, to form webs of personal relationships in cyberspace.
Pagina 447 - Alabama we have required that the subordinating interests of the State must survive exacting scrutiny. We also have insisted that there be a 'relevant correlation' or 'substantial relation' between the governmental interest and the information required to be disclosed.
Pagina 447 - This type of scrutiny is necessary even if any deterrent effect on the exercise of First Amendment rights arises, not through direct government action, but indirectly as an unintended but inevitable result of the government's conduct in requiring disclosure....