首页 > 最新文献

Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society最新文献

英文 中文
Redactable signatures on data with dependencies and their application to personal health records 具有依赖项的数据上的可重写签名及其在个人健康记录中的应用
David Bauer, D. Blough, A. Mohan
Storage of personal information by service providers risks privacy loss from data breaches. Our prior work on minimal disclosure credentials presented a mechanism to control the dissemination of personal information. In that work, personal data was broken into individual claims, which can be released in arbitrary subsets while still being cryptographically verifiable. In applying that work, we encountered the problem of connections between claims, which manifest as disclosure dependencies. In this work, we provide an efficient way to provide minimal disclosure, but with cryptographic enforcement of dependencies between claims, as specified by the claims certifier. This provides a mechanism for redactable signatures on data with disclosure dependencies. We show that an implementation of our scheme can verify thousands of dependent claims in tens of milliseconds. We also describe ongoing work in which the approach is being used within a larger system for dispensing personal health records.
服务提供商存储个人信息可能会因数据泄露而导致隐私丢失。我们之前关于最小披露凭证的工作提出了一种控制个人信息传播的机制。在这项工作中,个人数据被分解成个人索赔,这些索赔可以在任意子集中发布,同时仍然可以加密验证。在应用这项工作时,我们遇到了权利要求之间的联系问题,这表现为披露依赖关系。在这项工作中,我们提供了一种有效的方法来提供最小程度的披露,但在权利要求之间的依赖关系中使用加密强制,由权利要求证明者指定。这为具有披露依赖关系的数据提供了一种可重读签名的机制。我们证明了我们的方案的实现可以在几十毫秒内验证数千个依赖声明。我们还描述了正在进行的工作,其中该方法正在一个更大的系统中用于分发个人健康记录。
{"title":"Redactable signatures on data with dependencies and their application to personal health records","authors":"David Bauer, D. Blough, A. Mohan","doi":"10.1145/1655188.1655201","DOIUrl":"https://doi.org/10.1145/1655188.1655201","url":null,"abstract":"Storage of personal information by service providers risks privacy loss from data breaches. Our prior work on minimal disclosure credentials presented a mechanism to control the dissemination of personal information. In that work, personal data was broken into individual claims, which can be released in arbitrary subsets while still being cryptographically verifiable. In applying that work, we encountered the problem of connections between claims, which manifest as disclosure dependencies. In this work, we provide an efficient way to provide minimal disclosure, but with cryptographic enforcement of dependencies between claims, as specified by the claims certifier. This provides a mechanism for redactable signatures on data with disclosure dependencies. We show that an implementation of our scheme can verify thousands of dependent claims in tens of milliseconds. We also describe ongoing work in which the approach is being used within a larger system for dispensing personal health records.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"56 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82662691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Greek (privacy) tragedy: the introduction of social security numbers in Greece 希腊(隐私)悲剧:希腊引入社会安全号码
Eleni Gessiou, Alexandros Labrinidis, S. Ioannidis
We highlight the privacy issues that have arisen from the introduction of the Greek Social Security Number (AMKA), in connection with the availability of personally identifiable information on Greek web sites. In particular, we identify privacy problems with the current AMKA setup and present data from a web study we conducted in May 2009, exposing these problems. Given the anticipated ubiquity of AMKA in Greece in the future, along the lines of the Social Security Number in the US.
我们强调由于引入希腊社会安全号码(AMKA)而产生的隐私问题,这与希腊网站上个人身份信息的可用性有关。特别是,我们发现了当前AMKA设置存在的隐私问题,并提供了我们在2009年5月进行的一项网络研究的数据,揭示了这些问题。考虑到未来AMKA在希腊的普遍存在,就像美国的社会安全号码一样。
{"title":"A Greek (privacy) tragedy: the introduction of social security numbers in Greece","authors":"Eleni Gessiou, Alexandros Labrinidis, S. Ioannidis","doi":"10.1145/1655188.1655203","DOIUrl":"https://doi.org/10.1145/1655188.1655203","url":null,"abstract":"We highlight the privacy issues that have arisen from the introduction of the Greek Social Security Number (AMKA), in connection with the availability of personally identifiable information on Greek web sites. In particular, we identify privacy problems with the current AMKA setup and present data from a web study we conducted in May 2009, exposing these problems. Given the anticipated ubiquity of AMKA in Greece in the future, along the lines of the Social Security Number in the US.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"26 1","pages":"101-104"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90944034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Yet another privacy metric for publishing micro-data 这是发布微数据的另一个隐私度量标准
Keith B. Frikken, Yihua Zhang
Recently many schemes, including k-anonymity [8], l-diversity [6] and t-closeness [5] have been introduced for preserving individual privacy when publishing database tables. Furthermore k-anonymity and l-diversity have been shown to have weaknesses. In this paper, we show that t-closeness also has limitations, more specifically we argue that: i) choosing the correct value for t is difficult, ii) t-closeness does not allow some values of sensitive attributes to be more sensitive than other values, and iii) to prevent certain types of privacy leaks t must be set to such a small value that it produces low-quality published data. In this paper we propose a new privacy metric,(αi, βi)-closeness, that mitigates these problems. We also show how to calculate an optimal release table (in the full domain model) that satisfies (αi, βi)-closeness and we present experimental results that show that the data quality provided by 9αi, β;i),-closeness is higher than t-closeness, k-anonymity, and l-diversity while achieving the same privacy goals.
近年来,为了保护数据库表发布时的个人隐私,提出了许多方案,包括k-匿名[8]、l-多样性[6]和t-封闭性[5]。此外,k-匿名性和l-多样性也有弱点。在本文中,我们证明了t-close也有局限性,更具体地说,我们认为:i)为t选择正确的值是困难的,ii) t-close不允许某些敏感属性的值比其他值更敏感,iii)为了防止某些类型的隐私泄露,必须将t设置为如此小的值,从而产生低质量的发布数据。在本文中,我们提出了一个新的隐私度量(αi, βi)-亲密度,以缓解这些问题。我们还展示了如何计算满足(αi, βi)-亲密度的最优发布表(在全域模型中),我们给出的实验结果表明,在实现相同隐私目标的情况下,由9αi, β;i),-亲密度提供的数据质量高于t-亲密度,k-匿名性和l-多样性。
{"title":"Yet another privacy metric for publishing micro-data","authors":"Keith B. Frikken, Yihua Zhang","doi":"10.1145/1456403.1456423","DOIUrl":"https://doi.org/10.1145/1456403.1456423","url":null,"abstract":"Recently many schemes, including <i>k</i>-anonymity [8], <i>l</i>-diversity [6] and <i>t</i>-closeness [5] have been introduced for preserving individual privacy when publishing database tables. Furthermore <i>k</i>-anonymity and <i>l</i>-diversity have been shown to have weaknesses. In this paper, we show that <i>t</i>-closeness also has limitations, more specifically we argue that: i) choosing the correct value for <i>t</i> is difficult, ii) <i>t</i>-closeness does not allow some values of sensitive attributes to be more sensitive than other values, and iii) to prevent certain types of privacy leaks <i>t</i> must be set to such a small value that it produces low-quality published data. In this paper we propose a new privacy metric,(α<sub><i>i</i></sub>, β<sub><i>i</i></sub>)-closeness, that mitigates these problems. We also show how to calculate an optimal release table (in the full domain model) that satisfies (α<sub><i>i</i></sub>, β<sub><i>i</i></sub>)-closeness and we present experimental results that show that the data quality provided by 9α<sub><i>i</i></sub>, β;<sub><i>i</i></sub>),-closeness is higher than <i>t</i>-closeness, <i>k</i>-anonymity, and <i>l</i>-diversity while achieving the same privacy goals.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"94 1","pages":"117-122"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83890824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Measuring unlinkability revisited 重新测量不可链接性
Lars Fischer, S. Katzenbeisser, C. Eckert
Unlinkability describes the inability of an observer to decide whether certain items of interest are related or not. Privacy aware protocol designers need a consistent and meaningful unlinkability measure to asses protocols in face of different attacks. In this paper we show that entropy measures are not sufficient for measuring unlinkability. We propose an alternative measure that estimates the error made by an attacker. We show by example that our expected distance provides a consistent measure that offers a better estimation of message-unlinkability.
不可链接性描述了观察者无法确定某些感兴趣的项目是否相关。具有隐私意识的协议设计者需要一个一致的、有意义的不可链接性度量来评估面对不同攻击的协议。在本文中,我们证明熵测度不足以测量不链接性。我们提出了另一种方法来估计攻击者所犯的错误。我们通过示例表明,我们的预期距离提供了一个一致的度量,可以更好地估计消息不可链接性。
{"title":"Measuring unlinkability revisited","authors":"Lars Fischer, S. Katzenbeisser, C. Eckert","doi":"10.1145/1456403.1456421","DOIUrl":"https://doi.org/10.1145/1456403.1456421","url":null,"abstract":"Unlinkability describes the inability of an observer to decide whether certain items of interest are related or not. Privacy aware protocol designers need a consistent and meaningful unlinkability measure to asses protocols in face of different attacks. In this paper we show that entropy measures are not sufficient for measuring unlinkability. We propose an alternative measure that estimates the error made by an attacker. We show by example that our expected distance provides a consistent measure that offers a better estimation of message-unlinkability.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"6 1","pages":"105-110"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90106127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Revisiting a combinatorial approach toward measuring anonymity 重新审视衡量匿名性的组合方法
Benedikt Gierlichs, C. Troncoso, Claudia Díaz, B. Preneel, I. Verbauwhede
Recently, Edman et al. proposed the system's anonymity level [10], a combinatorial approach to measure the amount of additional information needed to reveal the communication pattern in a mix-based anonymous communication system as a whole. The metric is based on the number of possible bijective mappings between the inputs and the outputs of the mix. In this work we show that Edman et al.'s approach fails to capture the anonymity loss caused by subjects sending or receiving more than one message. We generalize the system's anonymity level in scenarios where user relations can be modeled as yes/no relations to cases where subjects send and receive an arbitrary number of messages. Further, we describe an algorithm to compute the redefined metric.
最近,Edman等人提出了系统的匿名级别[10],这是一种组合方法,用于衡量在基于混合的匿名通信系统中,揭示整个通信模式所需的附加信息的数量。度量是基于混合的输入和输出之间可能的双射映射的数量。在这项工作中,我们表明Edman等人的方法未能捕捉到由受试者发送或接收多个消息引起的匿名损失。在用户关系可以建模为是/否关系的场景中,我们将系统的匿名级别推广到主题发送和接收任意数量消息的情况。进一步,我们描述了一种算法来计算重新定义的度量。
{"title":"Revisiting a combinatorial approach toward measuring anonymity","authors":"Benedikt Gierlichs, C. Troncoso, Claudia Díaz, B. Preneel, I. Verbauwhede","doi":"10.1145/1456403.1456422","DOIUrl":"https://doi.org/10.1145/1456403.1456422","url":null,"abstract":"Recently, Edman et al. proposed the system's anonymity level [10], a combinatorial approach to measure the amount of additional information needed to reveal the communication pattern in a mix-based anonymous communication system as a whole. The metric is based on the number of possible bijective mappings between the inputs and the outputs of the mix. In this work we show that Edman et al.'s approach fails to capture the anonymity loss caused by subjects sending or receiving more than one message. We generalize the system's anonymity level in scenarios where user relations can be modeled as yes/no relations to cases where subjects send and receive an arbitrary number of messages. Further, we describe an algorithm to compute the redefined metric.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"2017 1","pages":"111-116"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86742870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Identification via location-profiling in GSM networks 在GSM网络中通过位置剖析进行识别
Yoni De Mulder, G. Danezis, L. Batina, B. Preneel
As devices move within a cellular network, they register their new location with cell base stations to allow for the correct forwarding of data. We show it is possible to identify a mobile user from these records and a pre-existing location profile, based on previous movement. Two different identification processes are studied, and their performances are evaluated on real cell location traces. The best of those allows for the identification of around 80% of users. We also study the misidentified users and characterise them using hierarchical clustering techniques. Our findings highlight the difficulty of anonymizing location data, and firmly establish they are personally identifiable.
当设备在蜂窝网络中移动时,它们会向蜂窝基站登记新位置,以便正确转发数据。我们展示了可以根据这些记录和先前存在的位置配置文件识别移动用户。研究了两种不同的识别方法,并在真实的小区定位轨迹上对其性能进行了评价。最好的方法可以识别大约80%的用户。我们还研究了被错误识别的用户,并使用分层聚类技术对其进行表征。我们的研究结果强调了匿名化位置数据的难度,并坚定地确立了它们是可识别个人身份的。
{"title":"Identification via location-profiling in GSM networks","authors":"Yoni De Mulder, G. Danezis, L. Batina, B. Preneel","doi":"10.1145/1456403.1456409","DOIUrl":"https://doi.org/10.1145/1456403.1456409","url":null,"abstract":"As devices move within a cellular network, they register their new location with cell base stations to allow for the correct forwarding of data. We show it is possible to identify a mobile user from these records and a pre-existing location profile, based on previous movement. Two different identification processes are studied, and their performances are evaluated on real cell location traces. The best of those allows for the identification of around 80% of users. We also study the misidentified users and characterise them using hierarchical clustering techniques. Our findings highlight the difficulty of anonymizing location data, and firmly establish they are personally identifiable.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"118 1","pages":"23-32"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82572722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
FlyByNight: mitigating the privacy risks of social networking FlyByNight:减轻社交网络的隐私风险
Matthew M. Lucas, N. Borisov
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service providers are able to observe and accumulate the information that users transmit through the network. We aim to mitigate this risk by presenting a new architecture for protecting information published through the social networking website, Facebook, through encryption. Our architecture makes a trade-off between security and usability in the interests of minimally affecting users' workflow and maintaining universal accessibility. While active attacks by Facebook could compromise users' privacy, our architecture dramatically raises the cost of such potential compromises and, importantly, places them within a framework for legal privacy protection because they would violate a user's reasonable expectation of privacy. We have built a prototype Facebook application implementing our architecture, addressing some of the limitations of the Facebook platform through proxy cryptography.
社交网站非常受欢迎,但它们给用户带来了许多隐私风险,其中最重要的是社交网络服务提供商能够观察和积累用户通过网络传输的信息。我们的目标是通过提出一种新的架构,通过加密来保护通过社交网站Facebook发布的信息,从而降低这种风险。我们的体系结构在安全性和可用性之间进行了权衡,以尽量减少对用户工作流程的影响,并保持普遍的可访问性。虽然Facebook的主动攻击可能会损害用户的隐私,但我们的架构极大地提高了这种潜在妥协的成本,重要的是,将它们置于法律隐私保护的框架内,因为它们会侵犯用户对隐私的合理期望。我们已经构建了一个原型Facebook应用程序来实现我们的架构,通过代理加密解决了Facebook平台的一些限制。
{"title":"FlyByNight: mitigating the privacy risks of social networking","authors":"Matthew M. Lucas, N. Borisov","doi":"10.1145/1456403.1456405","DOIUrl":"https://doi.org/10.1145/1456403.1456405","url":null,"abstract":"Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service providers are able to observe and accumulate the information that users transmit through the network. We aim to mitigate this risk by presenting a new architecture for protecting information published through the social networking website, Facebook, through encryption. Our architecture makes a trade-off between security and usability in the interests of minimally affecting users' workflow and maintaining universal accessibility. While active attacks by Facebook could compromise users' privacy, our architecture dramatically raises the cost of such potential compromises and, importantly, places them within a framework for legal privacy protection because they would violate a user's reasonable expectation of privacy. We have built a prototype Facebook application implementing our architecture, addressing some of the limitations of the Facebook platform through proxy cryptography.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"14 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78746986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 180
A user study of the expandable grid applied to P3P privacy policy visualization 可扩展网格应用于P3P隐私策略可视化的用户研究
R. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, L. Cranor
Displaying website privacy policies to consumers in ways they understand is an important part of gaining consumers' trust and informed consent, yet most website privacy policies today are presented in confusing, legalistic natural language. Moreover, because website privacy policy presentations vary from website to website, policies are difficult to compare and it is difficult for consumers to determine which websites offer the best privacy protections. The Platform for Privacy Preferences P3P) addresses part of the problem with natural language policies by providing a formal, machine-readable language for expressing privacy policies in a manner that is standardized across websites. To address remaining problems, an automated tool must be developed to read P3P policies and display them to users in a comprehensible way. To this end, we have developed a P3P policy presentation tool based on the Expandable Grid, a visualization technique for displaying policies in an interactive matrix. In prior work, the Expandable Grid has been shown to work well for displaying file permissions policies, so it appears to hold promise for presenting online privacy policies as well. To evaluate our Expandable Grid interface, we conducted two user studies, an online study with 520 participants and a laboratory study with 12 participants. The studies compared participants' comprehension of privacy policies presented with the Grid interface with their comprehension of the same policies presented in natural language. To our surprise, comprehension of policies was, for the most part, no better with the Grid interface than with natural language. We describe why the Grid interface did not perform well in our study and discuss implications for when and how the Expandable Grid concept can be usefully applied.
以消费者理解的方式向他们展示网站隐私政策是获得消费者信任和知情同意的重要组成部分,然而今天大多数网站隐私政策都是用令人困惑的、法律主义的自然语言呈现的。此外,由于网站隐私政策的介绍因网站而异,政策很难比较,消费者也很难确定哪些网站提供了最好的隐私保护。隐私偏好平台(Platform for Privacy Preferences, P3P)通过提供一种正式的、机器可读的语言,以跨网站标准化的方式表达隐私策略,解决了部分自然语言策略问题。为了解决剩下的问题,必须开发一个自动化工具来读取P3P策略,并以一种可理解的方式将它们显示给用户。为此,我们开发了一个基于可扩展网格的P3P策略表示工具,可扩展网格是一种用于在交互式矩阵中显示策略的可视化技术。在之前的工作中,可扩展网格已经被证明可以很好地显示文件权限策略,因此它似乎也有希望显示在线隐私策略。为了评估我们的可扩展网格界面,我们进行了两项用户研究,一项有520名参与者的在线研究和一项有12名参与者的实验室研究。这些研究比较了参与者对以网格界面呈现的隐私政策的理解和他们对以自然语言呈现的隐私政策的理解。令我们惊讶的是,在大多数情况下,使用网格接口对策略的理解并不比使用自然语言更好。我们描述了网格接口在我们的研究中表现不佳的原因,并讨论了何时以及如何有效应用可扩展网格概念的含义。
{"title":"A user study of the expandable grid applied to P3P privacy policy visualization","authors":"R. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, L. Cranor","doi":"10.1145/1572532.1572582","DOIUrl":"https://doi.org/10.1145/1572532.1572582","url":null,"abstract":"Displaying website privacy policies to consumers in ways they understand is an important part of gaining consumers' trust and informed consent, yet most website privacy policies today are presented in confusing, legalistic natural language. Moreover, because website privacy policy presentations vary from website to website, policies are difficult to compare and it is difficult for consumers to determine which websites offer the best privacy protections. The Platform for Privacy Preferences P3P) addresses part of the problem with natural language policies by providing a formal, machine-readable language for expressing privacy policies in a manner that is standardized across websites. To address remaining problems, an automated tool must be developed to read P3P policies and display them to users in a comprehensible way. To this end, we have developed a P3P policy presentation tool based on the Expandable Grid, a visualization technique for displaying policies in an interactive matrix. In prior work, the Expandable Grid has been shown to work well for displaying file permissions policies, so it appears to hold promise for presenting online privacy policies as well. To evaluate our Expandable Grid interface, we conducted two user studies, an online study with 520 participants and a laboratory study with 12 participants. The studies compared participants' comprehension of privacy policies presented with the Grid interface with their comprehension of the same policies presented in natural language. To our surprise, comprehension of policies was, for the most part, no better with the Grid interface than with natural language. We describe why the Grid interface did not perform well in our study and discuss implications for when and how the Expandable Grid concept can be usefully applied.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"31 1","pages":"45-54"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78850266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
CPG: closed pseudonymous groups CPG:封闭的假名组
Reed S. Abbott, Timothy W. van der Horst, K. Seamons
This paper presents the design and implementation of Closed Pseudonymous Groups (CPG), a pseudonymous communication system for a closed user community (e.g., a class of students, team of employees, residents of a neighborhood). In CPG, each legitimate user is known by a pseudonym that, while unlinkable to a true identity, enables service providers to link users' behavior and blacklist any abuser of the system. This system is useful for providing honest feedback without fear of reprisals (e.g., instructor/course ratings, employee comments, community feedback for local politics). CPG is designed to be easy to understand, to implement (using existing techniques), and to use. This paper also presents the results of an initial user study that resulted in an important design change.
本文介绍了封闭假名组(CPG)的设计和实现,这是一个针对封闭用户社区(例如,一个班级的学生,一个团队的员工,一个社区的居民)的假名通信系统。在CPG中,每个合法用户都有一个假名,虽然无法链接到真实身份,但服务提供商可以将用户的行为链接起来,并将任何滥用系统的人列入黑名单。这个系统有助于提供诚实的反馈,而不必担心遭到报复(例如,讲师/课程评分、员工评论、社区对当地政治的反馈)。CPG被设计成易于理解、执行(使用现有技术)和使用。本文还介绍了导致重要设计变更的初始用户研究的结果。
{"title":"CPG: closed pseudonymous groups","authors":"Reed S. Abbott, Timothy W. van der Horst, K. Seamons","doi":"10.1145/1456403.1456414","DOIUrl":"https://doi.org/10.1145/1456403.1456414","url":null,"abstract":"This paper presents the design and implementation of Closed Pseudonymous Groups (CPG), a pseudonymous communication system for a closed user community (e.g., a class of students, team of employees, residents of a neighborhood). In CPG, each legitimate user is known by a pseudonym that, while unlinkable to a true identity, enables service providers to link users' behavior and blacklist any abuser of the system. This system is useful for providing honest feedback without fear of reprisals (e.g., instructor/course ratings, employee comments, community feedback for local politics). CPG is designed to be easy to understand, to implement (using existing techniques), and to use. This paper also presents the results of an initial user study that resulted in an important design change.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"62 1","pages":"55-64"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84292694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forensic genomics: kin privacy, driftnets and other open questions 法医基因组学:亲属隐私、流网和其他悬而未决的问题
F. Stajano, L. Bianchi, P. Lio’, D. Korff
DNA analysis is increasingly used in forensics, where it is being pushed as the holy grail of identification. But we are approaching a dramatic "phase change" as we move from genetics to genomics: when sequencing the entire genome of a person becomes sufficiently cheap as to become a routine operation, as is likely to happen in the coming decades, then each DNA examination will expose a wealth of very sensitive personal information about the examined individual, as well as her relatives. In this interdisciplinary discussion paper we highlight the complexity of DNA-related privacy issues as we move into the genomic (as opposed to genetic) era: the "driftnet" approach of comparing scene-of-crime samples against the DNA of the whole population rather than just against that of chosen suspects; the potential for errors in forensic DNA analysis and the consequences on security and privacy; the civil liberties implications of the interaction between medical and forensic applications of genomics. For example, your kin can provide valuable information in a database matching procedure against you even if you don't; and being able to read the whole of a sampled genome, rather than just 13 specific markers from it, provides information about the medical and physical characteristics of the individual. Our aim is to offer a simple but thought-provoking and technically accurate summary of the many issues involved, hoping to stimulate an informed public debate on the statutes by which DNA collection, storage and processing should be regulated.
DNA分析越来越多地用于法医学,它被视为身份鉴定的圣杯。但是,随着我们从遗传学转向基因组学,我们正在接近一个戏剧性的“阶段变化”:当一个人的整个基因组测序变得足够便宜,成为一项常规操作时(这很可能在未来几十年发生),那么每次DNA检查都将暴露出有关被检查个体及其亲属的大量非常敏感的个人信息。在这篇跨学科的讨论论文中,我们强调了随着我们进入基因组(而不是基因)时代,DNA相关隐私问题的复杂性:将犯罪现场样本与整个人群的DNA进行比较的“漂网”方法,而不仅仅是与选定的嫌疑人的DNA进行比较;法医DNA分析出错的可能性以及对安全和隐私的影响;基因组学的医学和法医应用之间的相互作用对公民自由的影响。例如,即使你没有,你的亲属也可以在数据库匹配过程中提供有价值的信息;能够读取整个基因组样本,而不仅仅是其中的13个特定标记,提供了有关个人医学和身体特征的信息。我们的目的是对涉及的许多问题提供一个简单但发人深省且技术准确的总结,希望能激发公众对DNA收集、存储和处理应该受到监管的法规进行明智的辩论。
{"title":"Forensic genomics: kin privacy, driftnets and other open questions","authors":"F. Stajano, L. Bianchi, P. Lio’, D. Korff","doi":"10.1145/1456403.1456407","DOIUrl":"https://doi.org/10.1145/1456403.1456407","url":null,"abstract":"DNA analysis is increasingly used in forensics, where it is being pushed as the holy grail of identification. But we are approaching a dramatic \"phase change\" as we move from genetics to genomics: when sequencing the entire genome of a person becomes sufficiently cheap as to become a routine operation, as is likely to happen in the coming decades, then each DNA examination will expose a wealth of very sensitive personal information about the examined individual, as well as her relatives. In this interdisciplinary discussion paper we highlight the complexity of DNA-related privacy issues as we move into the genomic (as opposed to genetic) era: the \"driftnet\" approach of comparing scene-of-crime samples against the DNA of the whole population rather than just against that of chosen suspects; the potential for errors in forensic DNA analysis and the consequences on security and privacy; the civil liberties implications of the interaction between medical and forensic applications of genomics. For example, your kin can provide valuable information in a database matching procedure against you even if you don't; and being able to read the whole of a sampled genome, rather than just 13 specific markers from it, provides information about the medical and physical characteristics of the individual.\u0000 Our aim is to offer a simple but thought-provoking and technically accurate summary of the many issues involved, hoping to stimulate an informed public debate on the statutes by which DNA collection, storage and processing should be regulated.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"90 1","pages":"15-22"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80475156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1