Privacy Protection Schemes against Easy Information Access

被引:0
|
作者
Hong, Bigang [1 ]
机构
[1] Shaoyang Univ, Shaoyang, Peoples R China
关键词
privacy; information technology; protection model; comparative analysis;
D O I
10.4028/www.scientific.net/AMM.58-60.2152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information technology greatly facilitates our lives, and at the same time, people are able to invade personal privacy more easily than never before with the aid of recent technological advances. Reasons for this are discussed. Different protection models to meet the challenge are compared and a proper and improved one is proposed
引用
收藏
页码:2152 / 2157
页数:6
相关论文
共 50 条
  • [1] Privacy Protection and Access Control of Image Information Processing Devices
    Yi, Kijung
    Han, Minho
    Park, Jong Hyuk
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (05): : 711 - 716
  • [2] Mandatory Content Access Control for Privacy Protection in Information Centric Networks
    Li, Qi
    Sandhu, Ravi
    Zhang, Xinwen
    Xu, Mingwei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (05) : 494 - 506
  • [3] Protection of privacy against protection of health
    Bjerkedal, T
    [J]. ACTA OBSTETRICIA ET GYNECOLOGICA SCANDINAVICA, 2000, 79 (06) : 520 - 522
  • [4] Enforcing access to information and privacy rights: Evaluating proposals for an information protection regulator for South Africa
    Allan, Kate
    Currie, Iain
    [J]. SOUTH AFRICAN JOURNAL ON HUMAN RIGHTS, 2007, 23 : 570 - 586
  • [5] Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information
    Niu, Ben
    Gao, Sheng
    Li, Fenghua
    Li, Hui
    Lu, Zongqing
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,
  • [6] Privacy protection against malicious adversaries in distributed information sharing systems
    Zhang, Nan
    Zhao, Wei
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (08) : 1028 - 1033
  • [7] Comparison of Location Privacy Protection Schemes in VANETs
    Ma, Yaqiong
    Bai, Xiangyu
    [J]. 2019 12TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2019), 2019, : 79 - 83
  • [8] Privacy issues in RFID banknote protection schemes
    Avoine, G
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 33 - 48
  • [9] Privacy Protection Schemes for Fingerprint Recognition Systems
    Marasco, Emanuela
    Cukic, Bojan
    [J]. BIOMETRIC AND SURVEILLANCE TECHNOLOGY FOR HUMAN AND ACTIVITY IDENTIFICATION XII, 2015, 9457
  • [10] Privacy Protection for Speech Information
    Yamamoto, Kazumasa
    Nakagawa, Setichi
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 717 - 720