Practical data-swapping: the first steps
ACM Transactions on Database Systems (TODS)
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
A secure and privacy-protecting protocol for transmitting personal information between organizations
Proceedings on Advances in cryptology---CRYPTO '86
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
The underpinnings of privacy protection
Communications of the ACM - Special issue on internetworking
Values, personal information privacy, and regulatory approaches
Communications of the ACM
Multi party computations: past and present
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Towards a theory of privacy in the information age
ACM SIGCAS Computers and Society
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
The platform for privacy preferences
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Communications of the ACM
ACM Computing Surveys (CSUR)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the 12th annual conference on Computers, freedom and privacy
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Preserving privacy in web services
Proceedings of the 4th international workshop on Web information and data management
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
A new privacy model for hiding group interests while accessing the Web
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
E-P3P privacy policies and privacy authorization
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the First International Workshop on Information Hiding
Proceedings of the First International Workshop on Information Hiding
Real World Patterns of Failure in Anonymity Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Proceedings of the 2002 workshop on New security paradigms
Posit spaces: a performative model of e-commerce
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Do privacy seals in e-commerce really work?
Communications of the ACM - Mobile computing opportunities and challenges
Technologies for Trust in Electronic Commerce
Electronic Commerce Research
Preserving privacy when preference searching in e-commerce
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Authentication and authorisation infrastructures in b2c e-commerce
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
Electronic Commerce Research
APOD: Anonymous Physical Object Delivery
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Adoption and use of e-commerce in SMEs
Electronic Commerce Research
Enhanced security in internet voting protocol using blind signature and dynamic ballots
Electronic Commerce Research
Hi-index | 0.00 |
Privacy is an ancient concept, but its interpretation and application in the area of e-commerce are still new. It is increasingly widely accepted, however, that by giving precedence to consumer privacy bigger benefits can be reaped by all parties involved. There has been much investigation into the concept of privacy, legal frameworks for protecting this most impalpable of human values and, more recently, computing technologies that help preserve an individual's privacy in today's environment. In this paper we review the historical development of this fundamental concept, discussing how advancements both in society and in technology have challenged the right to privacy, and we survey the existing computing technologies that promote consumer privacy in e-commerce. Our study shows that historically the protection of privacy has been driven primarily both by our understanding of privacy and by the advancement of technology, analyses the limitations of privacy protections for current e-commerce applications, and identifies directions for the future development of successful privacy enhancing technologies.