Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Using organisational safeguards to make justifiable privacy decisions when processing personal data
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Flocks: distributed proxies for browsing privacy
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Distributed proxies for browsing privacy: a simulation of flocks
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
On agent technology for e-commerce: trust, security and legal issues
The Knowledge Engineering Review
Interoperability building of distance learning systems within the iCamp project
DIWED'06 Proceedings of the 6th WSEAS International Conference on Distance Learning and Web Engineering
Privacy provision in e-learning standardized systems: status and improvements
Computer Standards & Interfaces
E-commerce: protecting purchaser privacy to enforce trust
Electronic Commerce Research
Non-violative user profiling approach for website design improvement
CSCWD'04 Proceedings of the 8th international conference on Computer Supported Cooperative Work in Design I
Review: A survey on solutions and main free tools for privacy enhancing Web communications
Journal of Network and Computer Applications
Hi-index | 0.00 |
In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection with data content transfer, user profile disclosure or data disclosure itself. Identifying the threats and the technology that may be used for protection can provide satisfactory protection of privacy over general networks that are building today the information infrastructure. In general, these technologies are known as Privacy-Enhancing Technologies (PETs). This article analyses some of the key privacy-Enhancing Technologies and provides view in the on-going projects developing these technologies.