Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperNovember 2009
Enforcing purpose of use via workflows
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 113–116https://doi.org/10.1145/1655188.1655206One of the main privacy concerns of users when submitting their data to an organization is that their data will be used only for the specified purposes. Although privacy policies can specify the purpose, enforcing such policies remains a challenge. In ...
- short-paperNovember 2009
Plinko: polling with a physical implementation of a noisy channel
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 109–112https://doi.org/10.1145/1655188.1655205We give a practical polling protocol that is immune to tampering by either the pollster or the responder. It preserves responders' privacy in the manner of Warner's Randomized Response Technique, is easily understood without any knowledge of ...
- short-paperNovember 2009
Faking contextual data for fun, profit, and privacy
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 105–108https://doi.org/10.1145/1655188.1655204The amount of contextual data collected, stored, mined, and shared is increasing exponentially. Street cameras, credit card transactions, chat and Twitter logs, e-mail, web site visits, phone logs and recordings, social networking sites, all are ...
- research-articleNovember 2009
Redactable signatures on data with dependencies and their application to personal health records
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 91–100https://doi.org/10.1145/1655188.1655201Storage of personal information by service providers risks privacy loss from data breaches. Our prior work on minimal disclosure credentials presented a mechanism to control the dissemination of personal information. In that work, personal data was ...
- research-articleNovember 2009
A verifiable, centralized, coercion-free reputation system
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 61–70https://doi.org/10.1145/1655188.1655197Reputation systems are popular tools to evaluate the trustworthiness of an unknown party before a transaction, but the reputation score can greatly impact the rated subject, such that it might be inclined to suppress negative ratings. In order to elicit ...
- research-articleNovember 2009
PSP: private and secure payment with RFID
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 51–60https://doi.org/10.1145/1655188.1655196RFID can be used for a variety of applications, e.g., to conveniently pay for public transportation. However, achieving security and privacy of payment is challenging due to the extreme resource restrictions of RFID tags. In this paper, we propose PSP --...
- research-articleNovember 2009
On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 31–40https://doi.org/10.1145/1655188.1655193In Tor, a bridge is a client node that volunteers to help censored users access Tor by serving as an unlisted, first-hop relay. Since bridging is voluntary, the success of this circumvention mechanism depends critically on the willingness of clients to ...
- research-articleNovember 2009
A distortion-based metric for location privacy
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 21–30https://doi.org/10.1145/1655188.1655192We propose a novel framework for measuring and evaluating location privacy preserving mechanisms in mobile wireless networks. Within this framework, we first present a formal model of the system, which provides an efficient representation of the network ...
- research-articleNovember 2009
The effects of introspection on creating privacy policy
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic societyPages 1–10https://doi.org/10.1145/1655188.1655190Prior work in psychology shows that introspection inhibits intuition: asking human users to analyze judgements they make can cause them to be quantitatively worse at making those judgments. In this paper, we explore whether this seemingly contradictory ...
- proceedingNovember 2009
WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society
It is my great pleasure to welcome you to the 8th ACM Workshop on Privacy in the Electronic Society -- WPES'09, held in association with the ACM Computer and Communications Security Conference, November 9, 2009, in Chicago, IL (USA).
Thanks to the ...