Browsing by Subject "Privacy"
Now showing items 1-9 of 9
-
Big Data Privacy Scenarios
(2015-10-01)This paper is the first in a series on privacy in Big Data. As an outgrowth of a series of workshops on the topic, the Big Data Privacy Working Group undertook a study of a series of use scenarios to highlight the challenges ...
-
Distribution Volume Tracking on Privacy-Enhanced Wireless Grid
(2004-07-25)In this paper, we discuss a wireless grid in which users are highly mobile, and form ad-hoc and sometimes short-lived connections with other devices. As they roam through networks, the users may choose to employ ...
-
Information Slicing: Anonymity Using Unreliable Overlays
(2007-02-23)This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. ...
-
Keeping Secrets in Hardware: the Microsoft Xbox(TM) Case Study
(2002-05-26)This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...
-
Perfect Implementation of Normal-Form Mechanisms
(2005)Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...
-
Privacy and Security Risks for National Health Records Systems
(2018-01-24)A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security ...
-
Privacy engineering for social networks
(University of CambridgeFaculty of Computer Science and TechnologyComputer Laboratory, 2013-01-08)In this dissertation, I enumerate several privacy problems in online social networks (OSNs) and describe a system called Footlights that addresses them. Footlights is a platform for distributed social applications that ...
-
Quantitative Information Flow as Network Flow Capacity
(2007-12-10)We present a new technique for determining how much information abouta program's secret inputs is revealed by its public outputs. Incontrast to previous techniques based on reachability from secretinputs (tainting), it ...
-
Quantitative Information-Flow Tracking for C and Related Languages
(2006-11-17)We present a new approach for tracking programs' use of data througharbitrary calculations, to determine how much information about secretinputs is revealed by public outputs. Using a fine-grained dynamicbit-tracking ...