Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding identities and respecting citizens' privacy are becoming extremely important. Dedicated to this issue, this paper is organized as follows: after defining the topic through an example of collaborative complex and heterogeneous system, this paper analyzes the most typical anonymization procedures. Afterwards it proposes a rigorous approach to define anonymization requirements, as well as how to characterize, select and build solutions. Finally, a new generic procedure to anonymize and link identities is proposed. We suggest that a critical part of this procedure is carried out in a smart card. According to needs, anonymized data are processed thr...
User centric identity management will be necessary to protect user's privacy in an electronic societ...
There are numerous information privacy approaches based on the four major models of privacy protecti...
In this work, the authors analyze the concept and definitions of anonymity in the modern connected w...
Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding id...
Nowadays, collaboration and social interaction among people become everyday activities in our evolvi...
Nowadays, more and more applications use sensitive and personal information, and preserving citizens...
Abstract: - The uptake and utility of digital collaborations continues to grow as organizations are ...
Network anonymization solutions were mostly designed with a single-user usage model in mind. Indeed,...
Nowadays, more and more applications use sensitive and personal information. Subsequently, respectin...
This paper presents a new technique for anonymizing personal data for studies in which the real name...
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonym...
The uptake and utility of digital collaboration’s continues to grow as organizations are realizing t...
So far the number of users on the social network sites has been increasing year-on-year. In the mean...
Nowadays the wide diffusion of applications that handle data referring to individuals requires the d...
Cybersecurity mechanisms have become increasingly important as online and offline worlds converge. S...
User centric identity management will be necessary to protect user's privacy in an electronic societ...
There are numerous information privacy approaches based on the four major models of privacy protecti...
In this work, the authors analyze the concept and definitions of anonymity in the modern connected w...
Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding id...
Nowadays, collaboration and social interaction among people become everyday activities in our evolvi...
Nowadays, more and more applications use sensitive and personal information, and preserving citizens...
Abstract: - The uptake and utility of digital collaborations continues to grow as organizations are ...
Network anonymization solutions were mostly designed with a single-user usage model in mind. Indeed,...
Nowadays, more and more applications use sensitive and personal information. Subsequently, respectin...
This paper presents a new technique for anonymizing personal data for studies in which the real name...
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonym...
The uptake and utility of digital collaboration’s continues to grow as organizations are realizing t...
So far the number of users on the social network sites has been increasing year-on-year. In the mean...
Nowadays the wide diffusion of applications that handle data referring to individuals requires the d...
Cybersecurity mechanisms have become increasingly important as online and offline worlds converge. S...
User centric identity management will be necessary to protect user's privacy in an electronic societ...
There are numerous information privacy approaches based on the four major models of privacy protecti...
In this work, the authors analyze the concept and definitions of anonymity in the modern connected w...