The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Network security: private communication in a public world
Network security: private communication in a public world
Anonymous Web transactions with Crowds
Communications of the ACM
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
The ephemerizer: making data disappear
The ephemerizer: making data disappear
IEEE Security and Privacy
An honest man has nothing to fear: user perceptions on web-based information disclosure
Proceedings of the 3rd symposium on Usable privacy and security
Self-monitoring of web-based information disclosure
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Could googling take down a president?
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Learning to Disambiguate Search Queries from Short Sessions
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Private information disclosure from web searches
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Hi-index | 0.00 |
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional lives. As a result, users and organizations are freely providing unprecedented amounts of sensitive information in return for such services as Internet search, email, mapping, blog hosting, instant messaging and language translation. Traditional security measures, such as cryptography and network firewalls, are largely ineffective because of the implicit trust paradigm with the service provider. In this paper, we directly address this problem by providing a threat analysis framework of information disclosure vectors, including fingerprinting of individuals and groups based on their online activities, examine the effectiveness of existing privacy countermeasures and clearly outline the critical future work required to protect our corporate, organizational and individual privacy when using these services.