UMFE: a user modelling front-end subsystem
International Journal of Man-Machine Studies
Security in computing
Role-Based Access Control Models
Computer
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Introducing SSL and certificates using SSLeay
World Wide Web Journal - Special issue: Web security: a matter of trust
The design, implementation and operation of an email pseudonym server
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Speech acts, electronic commerce, and KQML
Decision Support Systems - Special issue: logic modeling
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
The platform for privacy preferences
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Anonymous mechanisms in group decision support systems communication
Decision Support Systems
One for all and all in one: a learner modelling server in a multi-agent platform
UM '99 Proceedings of the seventh international conference on User modeling
Project “anonymity and unobservability in the Internet”
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Putting personalization into practice
Communications of the ACM - The Adaptive Web
Personalized hypermedia and international privacy
Communications of the ACM - The Adaptive Web
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Cryptography and data security
Cryptography and data security
E-Commerce Recommendation Applications
Data Mining and Knowledge Discovery
Logic-Based Representation and Reasoning for User Modeling Shell Systems
User Modeling and User-Adapted Interaction
User Modeling and User-Adapted Interaction
A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web
User Modeling and User-Adapted Interaction
User Modeling for Personalized City Tours
Artificial Intelligence Review
JATLite: A Java Agent Infrastructure with Message Routing
IEEE Internet Computing
Privacy Risks in Recommender Systems
IEEE Internet Computing
Agent-Based Engineering, the Web, and Intelligence
IEEE Expert: Intelligent Systems and Their Applications
Inference Control in Statistical Databases, From Theory to Practice
Inference Control in Statistical Databases, From Theory to Practice
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
Security and Privacy in User Modeling
Security and Privacy in User Modeling
Usability meets security - the Identity-Manager as your personal security assistant for the Internet
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Personalised hypermedia presentation techniques for improving online customer relationships
The Knowledge Engineering Review
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
'I didn't buy it for myself' privacy and ecommerce personalization
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
'I didn't buy it for myself': privacy and Ecommerce personalization
Designing personalized user experiences in eCommerce
Impacts of user privacy preferences on personalized systems: a comparative study
Designing personalized user experiences in eCommerce
The claim tool kit for ad hoc recognition of peer entities
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
Consistent Modelling of Users, Devices and Sensors in a Ubiquitous Computing Environment
User Modeling and User-Adapted Interaction
Online information disclosure: Motivators and measurements
ACM Transactions on Internet Technology (TOIT)
AdROSA-Adaptive personalization of web advertising
Information Sciences: an International Journal
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Investigating Privacy Attitudes and Behavior in Relation to Personalization
Social Science Computer Review
Respecting Users' Individual Privacy Constraints in Web Personalization
UM '07 Proceedings of the 11th international conference on User Modeling
User identification for cross-system personalisation
Information Sciences: an International Journal
Privacy enhanced personalization in e-learning
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A transformational model for Organizational Memory Systems management with privacy concerns
Information Sciences: an International Journal
Improving Privacy of Recommender Agents by Means of Full Dissociation
Proceedings of the 2006 conference on Artificial Intelligence Research and Development
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Online anonymity for personalized web services
Proceedings of the 18th ACM conference on Information and knowledge management
Is that really you?: an approach to assure identity without revealing real-name online
Proceedings of the 5th ACM workshop on Digital identity management
The adaptive web
Personalization in e-commerce applications
The adaptive web
Privacy-enhanced web personalization
The adaptive web
A critical approach to privacy research in ubiquitous environments-issues and underlying assumptions
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Privacy issues in educational systems
International Journal of Internet Technology and Secured Transactions
A dynamic privacy model for web services
Computer Standards & Interfaces
Online anonymity protection in computer-mediated communication
IEEE Transactions on Information Forensics and Security
User model interoperability: a survey
User Modeling and User-Adapted Interaction
Temporal blurring: a privacy model for OMS users
UM'05 Proceedings of the 10th international conference on User Modeling
Secure identity management for pseudo-anonymous service access
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
Evaluating recommender systems from the user's perspective: survey of the state of the art
User Modeling and User-Adapted Interaction
A PLA-based privacy-enhancing user modeling framework and its evaluation
User Modeling and User-Adapted Interaction
International Journal of Business Information Systems
Div-clustering: Exploring active users for social collaborative recommendation
Journal of Network and Computer Applications
Hi-index | 0.00 |
User-adaptive applications cater to the needs of each individual computer user, taking for example users' interests, level of expertise, preferences, perceptual and motoric abilities, and the usage environment into account. Central user modeling servers collect and process the information about users that different user-adaptive systems require to personalize their user interaction.Adaptive systems are generally better able to cater to users the more data their user modeling systems collect and process about them. They therefore gather as much data as possible and "lay them in stock" for possible future usage. Moreover, data collection usually takes place without users' initiative and sometimes even without their awareness, in order not to cause distraction. Both is in conflict with users' privacy concerns that became manifest in numerous recent consumer polls, and with data protection laws and guidelines that call for parsimony, purpose-orientation, and user notification or user consent when personal data are collected and processed.This article discusses security requirements to guarantee privacy in user-adaptive systems and explores ways to keep users anonymous while fully preserving personalized interaction with them. User anonymization in personalized systems goes beyond current models in that not only users must remain anonymous, but also the user modeling system that maintains their personal data. Moreover, users' trust in anonymity can be expected to lead to more extensive and frank interaction, hence to more and better data about the user, and thus to better personalization. A reference model for pseudonymous and secure user modeling is presented that meets many of the proposed requirements.