41 resultados para Anonymity


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although there are lots of work to provide privacy and anonymity, little focus has been given to ensure confidentiality and integrity of RFID tag data. To this end, we propose a lightweight hybrid approach based on stenographic and watermarking to ensure data confidentiality, linkability resistance and integrity on the RFID tags data. The proposed technique is capable of tampered data recovering and restoring for RFID tag. It has been validated and tested on EPC class 1 gen2 tags.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is a critical securing measure method employed to mitigate these problems. In this paper, we propose a novel secure and anonymous source routing protocol, called SADSR, based on Dynamic Source Routing (DSR) for wireless ad hoc networks. In the proposed scheme, we use the pseudonym, pseudonym based cryptography and the bloom filter to establish secure and anonymous routing in wireless ad hoc networks. Compared to other anonymous routing protocol, SADSR is not only anonymous but also the secure in the routing discover process and data transmission process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio-frequency identification (RFID) is seen as one of the requirements for the implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped with a holistic security framework for a secure and scalable operation. Although much work has been done to provide privacy and anonymity, little focus has been given to performance, scalability and customizability issues to support robust implementation of IoT. Also, existing protocols suffer from a number of deficiencies such as insecure or inefficient identification techniques, throughput delay and inadaptability. In this paper, we propose a novel identification technique based on a hybrid approach (group-based approach and collaborative approach) and security check handoff (SCH) for RFID systems with mobility. The proposed protocol provides customizability and adaptability as well as ensuring the secure and scalable deployment of an RFID system to support a robust distributed structure such as the IoT. The protocol has an extra fold of protection against malware using an incorporated malware detection technique. We evaluated the protocol using a randomness battery test and the results show that the protocol offers better security, scalability and customizability than the existing protocols. © 2014 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present paper aims to review current evidence for the effectiveness and/or feasibility of using inter-agency data sharing of ED recorded assault information to direct interventions reducing alcohol-related or nightlife assaults, injury or violence. Potential data-sharing partners involve police, local council, liquor licensing regulators and venue management. A systematic review of the peer-reviewed literature was conducted. The initial search discovered 19,506 articles. After removal of duplicates and articles not meeting review criteria, n = 8 articles were included in quantitative and narrative synthesis. Seven of eight studies were conducted in UK EDs, with the remaining study presenting Australian data. All studies included in the review deemed data sharing a worthwhile pursuit. All studies attempting to measure intervention effectiveness reported substantial reductions of assaults and ED attendances post-intervention, with one reporting no change. Negative logistic feasibility concerns were minimal, with general consensus among authors being that data-sharing protocols and partnerships could be easily implemented into modern ED triage systems, with minimal cost, staff workload burden, impact to patient safety, service and anonymity, or risk of harm displacement to other licensed venues, or increase to length of patient stay. However, one study reported a potential harm displacement effect to streets surrounding intervention venues. In future, data-sharing systems should triangulate ED, police and ambulance data sources, and assess intervention effectiveness using randomised controlled trials that account for variations in venue capacity, fluctuations in ED attendance and population levels, seasonal variations in assault and injury, and control for concurrent interventions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When educational research is conducted online, we sometimes promise our participants that they will be anonymous—but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical study into the prevalence of direct quotes from participants in a subset of the educational technology literature. Using basic web search techniques, the source of direct quotes could be found in 10 of 112 articles. Analysis of the articles revealed previously undiscussed threats from data triangulation and expert analysis/diagnosis. Issues of ethical obliviousness, obscurity and concern for future privacy-invasive technologies are also discussed. Recommendations for researchers, journals and institutional ethics review boards are made for how to better protect participants' anonymity against current and future threats.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the increase use of location-based services, location privacy has recently raised serious concerns. To protect a user from being identified, a cloaked spatial region that contains other k-1 nearest neighbors of the user is used to replace the accurate position. In this paper, we consider location-aware applications that services are different among regions. To search nearest neighbors, we define a novel distance measurement that combines the semantic distance and the Euclidean distance to address the privacy preserving issue in the above-mentioned applications. We also propose an algorithm kNNH to implement our proposed method. The experimental results further suggest that the proposed distance metric and the algorithm can successfully retain the utility of the location services while preserving users’ privacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We document a positive relation between stock liquidity and firm value. We examine the mechanism through which stock market liquidity enhances firm value by dividing firm value, as measured by Tobin’s Q, into three components, namely, operating income to price, leverage, and operating income to assets. Using the switch to broker anonymity as an exogenous shock to market liquidity, we show that the increase in liquidity around the shock leads to an increase in firm value. Our results suggest that higher firm value for more liquid stocks seems to stem from enhanced stock prices rather than from better operating performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although much work has been done to provide privacy and anonymity, little focus has been given to ensure RFID data confidentiality, integrity and to address the tampered data recovery problem. To this end, we propose a lightweight stenographic-based approach to ensure RFID data confidentiality and integrity as well as the recovery of tampered RFID data. © 2013 Springer-Verlag Berlin Heidelberg.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Judicial decisions about whether or not to publicly name child homicide offenders have long ani- mated debate in the United Kingdom and internationally. This article draws on case law and in- depth interviews conducted with members of the English criminal justice system to critically analyse the viability of current domestic legislation in the context of the UK’s international human rights obligations. The article identifies ambiguities surrounding the definition of ‘public interest’ in law; the merits of equating the naming of child offenders with open justice, accountability and transpar- ency; and the increasing sabotage of the principle of rehabilitation. By identifying the complexities of this contentious area of judicial discretion, this article highlights the need for a rights-based approach to decisions about publicly naming children in conflict with the law.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptocurrencies such as Bitcoin are a recent socio-technical innovation that seeks to disrupt the existing monetary system. Through mundane uses of this new digital cash, they provide a social critique of the centralised infrastructures of the banking industry. This paper outlines an ethnographic research agenda that considers how the social uptake and use of cryptocurrencies such as Bitcoin represents alternative views towards value exchange and critiques existing financial structures. We begin by arguing that the use of Bitcoin can be seen as an act of social resistance that is intended to bridge socio-economic inequalities within the context of a digital community. We then outline the disruptive nature of borderless, affordable and instantaneous international transfers in the form of remittances within social practice. Finally, we identify the possible permutations of trust that may be found in the technical affordances of Bitcoin technology and how these relate to user (pseudo)anonymity, cybertheft, cyberfraud, and consumer protection. Bringing together these three key areas, we highlight the importance of understanding the ordinary (rather than extra-ordinary) uses of cryptocurrencies such as Bitcoin. We contend that focusing upon users’ interactions with Bitcoin as a payments system and community culture will shed light upon mundane acts of socio-technical disruption, acts that critique and provide alternative financial exchange practices to the payments and regulatory financial infrastructures of the banking industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The introduction of online social networks (OSN) has transformed the way people connect and interact with each other as well as share information. OSN have led to a tremendous explosion of network-centric data that could be harvested for better understanding of interesting phenomena such as sociological and behavioural aspects of individuals or groups. As a result, online social network service operators are compelled to publish the social network data for use by third party consumers such as researchers and advertisers. As social network data publication is vulnerable to a wide variety of reidentification and disclosure attacks, developing privacy preserving mechanisms are an active research area. This paper presents a comprehensive survey of the recent developments in social networks data publishing privacy risks, attacks, and privacy-preserving techniques. We survey and present various types of privacy attacks and information exploited by adversaries to perpetrate privacy attacks on anonymized social network data. We present an in-depth survey of the state-of-the-art privacy preserving techniques for social network data publishing, metrics for quantifying the anonymity level provided, and information loss as well as challenges and new research directions. The survey helps readers understand the threats, various privacy preserving mechanisms, and their vulnerabilities to privacy breach attacks in social network data publishing as well as observe common themes and future directions.