The claim tool kit for ad hoc recognition of peer entities
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing
Proceedings of the 2005 workshop on Digital identity management
Towards an evaluation methodology for computational trust systems
iTrust'05 Proceedings of the Third international conference on Trust Management
Analyzing Internet e-mail date-spoofing
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Adaptive semi-private email aliases
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |
Solutions for privacy protection exhibit five role categories: prevention, detection, awareness, response, and recovery. Few recovery tools are available, though, especially for private data linked to permanent real-world facts (such as a user's birthday). Generally, once private data is revealed, second use cannot be controlled. In the case of email addresses, we argue that recovery-like tools do exist: Disposable Email Addresses (DEAs) can be closed when they are compromised by spam, because there is generally no requirement for email address to become permanent private data. In this article, we investigate the use and cost-benefit of DEAs as a mechanism for privacy recovery.