2013 17th International Conference on Intelligence in Next Generation Networks (ICIN) 2013
DOI: 10.1109/icin.2013.6670898
|View full text |Cite
|
Sign up to set email alerts
|

Real-time privacy-preserving cobrowsing with element masking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…The deterrents that should be overcome in module less intuitive cobrowsing incorporate managing treats, page personalization, login sessions, or solicitations for validation while managing the solid safety efforts and certainty prerequisites given by both the working framework and the web program (with most essential security impediment being "A similar inception strategy". In customer server based cobrowsing framework an answer has been proposed in [14] by empowering the client to control which web application information is proliferated and to authorize security strategies upon private information inside a cobrowse session.…”
Section: Related Workmentioning
confidence: 99%
“…The deterrents that should be overcome in module less intuitive cobrowsing incorporate managing treats, page personalization, login sessions, or solicitations for validation while managing the solid safety efforts and certainty prerequisites given by both the working framework and the web program (with most essential security impediment being "A similar inception strategy". In customer server based cobrowsing framework an answer has been proposed in [14] by empowering the client to control which web application information is proliferated and to authorize security strategies upon private information inside a cobrowse session.…”
Section: Related Workmentioning
confidence: 99%
“…In many cobrowsing implementations, a dedicated proxy server is utilized to distribute the Web page content between the Session Creator and the Session Participants [10]. This is a suitable architecture for our retail scenario, especially as the proxy server can be allocated in the Cloud close to the application server.…”
Section: Privacy-aware Cobrowsing Technologymentioning
confidence: 99%
“…Furthermore, they require storing all private information occurring in a cobrowsing session, such as customer details, on the cobrowsing server, which is not desired. To cope with these insufficiencies, we have developed a new architecture and method called "Privacy Preserving Cobrowsing" (see Figure 3) [10]. In this architecture, there is no proxy between the Web service and the Session Creator (e.g.…”
Section: Privacy-aware Cobrowsing Technologymentioning
confidence: 99%