EUROCON 2007 - The International Conference on "Computer as a Tool" 2007
DOI: 10.1109/eurcon.2007.4400521
|View full text |Cite
|
Sign up to set email alerts
|

A Proxy for Privacy: the Discreet Box

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…In order to ensure that the personal data collected is used only to support authorized services by authorized providers, solutions have been proposed that usually rely on a system called privacy broker [91]. The proxy interacts with the user on the one side and with the services on the other.…”
Section: Privacymentioning
confidence: 99%
“…In order to ensure that the personal data collected is used only to support authorized services by authorized providers, solutions have been proposed that usually rely on a system called privacy broker [91]. The proxy interacts with the user on the one side and with the services on the other.…”
Section: Privacymentioning
confidence: 99%
“…Such a design aims to implement access control policies to evaluate requests and decide whether to allow access to data or not. To combat the privacy violation by a rogue sensor network, current solutions in privacy involve users going through a privacy broker [95], which itself if an intermediary entity between the user and the sensor network that can be subject to threats. Similarly, other techniques to provide privacy to traditionally centralized IoT infrastructures, namely group signatures [96] and ring signatures [97] also use heavily centralized intermeiaries that are vulnerable to security threats.…”
Section: A Privacy Concerns In Centralized Iot Modelsmentioning
confidence: 99%
“…[119] also discusses the necessity for data typification as well as ownership, access extent (minimum and maximum of data to be read), anonymity and its viability. [4] proposes the implementation of opt-out features managed by individuals wherever an untrustworthy sensor network has been implemented, also called "right to silence of the chips" [16, p. 26], as well the interaction with a "privacy broker" [122] that acts as a proxy between the user and the network. [120] indicates that technological solutions are not enough to address the current privacy issues and calls for the consideration of economical and socio-ethic aspects of the IoT environment.…”
Section: Privacymentioning
confidence: 99%