Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
Abstract. Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, we proposed a dynamic privacy-enhancing user modeli...
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achi...
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacri...
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...