Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Political artifacts and personal privacy: the yenta multiagent distributed matchmaking system
Political artifacts and personal privacy: the yenta multiagent distributed matchmaking system
Impacts of user privacy preferences on personalized systems: a comparative study
Designing personalized user experiences in eCommerce
Improving recommendation lists through topic diversification
WWW '05 Proceedings of the 14th international conference on World Wide Web
Hi-index | 0.00 |
Our approach is to give privacy to the profile and behaviour of the user; the state of the art for privacy consists of encryption algorithms, occultation and temporary association of a user's information. In all cases these aspects present pros and cons. A primary disadvantage is that within a certain amount of time an attacker is capable of reconstruct the original information (encryptation), finding the information (occultation) and relating it to the original user (temporary association). In our approach, full dissociation is used to impede any relation with the original user. It is the concept of full dissociation which considerably reduces the available time for an attacker to discover the relation with the original user.