Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user’s real intentions (an inference attack) when the user downloads the entire database. Although this approach is somewhat impractical, it is the only way in which to guarantee complete safety from prying eyes. Inference attacks on a user generally assume that the attack is taking place from the perspec-tive of the Database Administrator. It is therefore implicit that there is an intimate knowledge of the database being accessed by the user. Given the nature of the Web and some of the Large Public Databases being accessed via the Web, we wish to determine if inference attacks launched on a user can be succ...
In recent years, there has been much research in the adoption of Ranked Retrieval model (in addition...
Many modern websites are built on a "mash-up " of numerous web technologies and libraries....
Traces related to our identity are left every day while we browse the Internet. Being the user’s inf...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amoun...
International audienceRegularly, hackers steal data sets containing user identifiers and passwords. ...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
International audienceNowadays, users are permanently prompted to create web accounts when they buy ...
Publicly accessible databases are an indispensable resource for retrieving up to date information. B...
Abstract—URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a mean...
Over the last decade, privacy has been widely recognised as one of the major problems of data collec...
During the last few years, the technological progress in collecting, storing and processing a large ...
Access control can be used to ensure that database queries pertaining to sensitive information are n...
In recent years, there has been much research in the adoption of Ranked Retrieval model (in addition...
Many modern websites are built on a "mash-up " of numerous web technologies and libraries....
Traces related to our identity are left every day while we browse the Internet. Being the user’s inf...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amoun...
International audienceRegularly, hackers steal data sets containing user identifiers and passwords. ...
User privacy on the internet is an important and unsolved problem. So far, no sufficient and compreh...
International audienceNowadays, users are permanently prompted to create web accounts when they buy ...
Publicly accessible databases are an indispensable resource for retrieving up to date information. B...
Abstract—URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a mean...
Over the last decade, privacy has been widely recognised as one of the major problems of data collec...
During the last few years, the technological progress in collecting, storing and processing a large ...
Access control can be used to ensure that database queries pertaining to sensitive information are n...
In recent years, there has been much research in the adoption of Ranked Retrieval model (in addition...
Many modern websites are built on a "mash-up " of numerous web technologies and libraries....
Traces related to our identity are left every day while we browse the Internet. Being the user’s inf...