Privacy Protection: Regulations and Technologies, Opportunities and Threats

作者: D. Pedreschi , F. Bonchi , F. Turini , V. S. Verykios , M. Atzori

DOI: 10.1007/978-3-540-75177-9_5

关键词:

摘要: Information and communication technologies (ICTs) touch on many aspects of our lives. The integration of ICTs is enhanced by the advent mobile, wireless, and ubiquitous technologies. are increasingly embedded in common services, such as mobile wireless communication, Internet browsing, credit card e-transactions, electronic health records. As ICT-based become ubiquitous, our everyday actions leave behind detailed digital traces in the information systems service providers. For example, consumers of phone geographic position to cellular provider records; users Web page packet requests their computers access logs domain network administrators, and card transactions reveal locations times where purchases were completed. Traces an artifact design services, such that collection and storage difficult avoid. To dispatch calls, for instance, current design networks requires knowledge each user’s geographic position. Analogously, DNS servers need know IP addresses to dispatch requests from source destination computers. Dino , Francesco Bonchi, Franco Turini, Vassilios S. Verykios, Maurizio Atzori, Bradley Malin, Bart Moelans, Yucel Saygin:

参考文章(18)
Murat Kantarcioglu, Chris Clifton, Jaideep Vaidya, Defining Privacy for Data Mining ,(2002)
Andrei Serjantov, George Danezis, Towards an information theoretic metric for anonymity privacy enhancing technologies. pp. 41- 53 ,(2002) , 10.1007/3-540-36467-6_4
Vladimir Estivill-Castro, Ljiljana Brankovic, Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules data warehousing and knowledge discovery. pp. 389- 398 ,(1999) , 10.1007/3-540-48298-9_41
Stephen E. Fienberg, Julie McIntyre, Data Swapping: Variations on a Theme by Dalenius and Reiss privacy in statistical databases. pp. 14- 29 ,(2004) , 10.1007/978-3-540-25955-8_2
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi, k-Anonymous Patterns Knowledge Discovery in Databases: PKDD 2005. pp. 10- 21 ,(2005) , 10.1007/11564126_7
Claudio Bettini, X. Sean Wang, Sushil Jajodia, Protecting privacy against location-based personal identification very large data bases. ,vol. 3674, pp. 185- 199 ,(2005) , 10.1007/11552338_13
Alessandro Acquisti, Privacy in electronic commerce and the economics of immediate gratification Proceedings of the 5th ACM conference on Electronic commerce - EC '04. pp. 21- 29 ,(2004) , 10.1145/988772.988777
Benny Pinkas, Cryptographic techniques for privacy-preserving data mining Sigkdd Explorations. ,vol. 4, pp. 12- 19 ,(2002) , 10.1145/772862.772865
Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu, Tools for privacy preserving distributed data mining Sigkdd Explorations. ,vol. 4, pp. 28- 34 ,(2002) , 10.1145/772862.772867