anonymity

On the declassification of confidential documents

Publication Type:

Conference Proceedings

Source:

Modeling Decisions for Artificial Intelligence, MDAI 2011, Springer, Volume 6820, Changsha, China, p.235-246 (2011)

URL:

http://www.springerlink.com/content/tg81j807q42x8837/

Keywords:

declassification; anonymity; privacy preserving information retrieval; semantic; data privacy; information retrieval; pattern classification; named-entity recognition

Abstract:

Abstract. We introduce the anonymization of unstructured documents to settle the base of automatic declassification of confidential documents. Departing from known ideas and methods of data privacy, we introduce the main issues of unstructured document anonymization and propose the use of named entity recognition techniques from natural language processing and information extraction to identify the entities of the document that need to be protected.

Towards Semantic Microaggregation of Categorical Data for Confidential Documents

Publication Type:

Conference Proceedings

Source:

Modeling Decisions for Artificial Intelligence, MDAI 2010, Springer, Volume 6408, Perpignan, France, p.266-276 (2010)

URL:

http://www.springerlink.com/content/f41402862155w6t4/

Keywords:

Web indexing task; classification task; frequency term vector; k-anonymity preservation; privacy preserving information retrieval; semantic microaggregation; Internet; data privacy; information retrieval; pattern classification; vectors

Abstract:

In the data privacy context, specifically, in statistical disclosure control techniques, microaggregation is a well-known microdata protection method, ensuring the confidentiality of each individual. In this paper, we propose a new approach of microaggregation to deal with semantic sets of categorical data, like text documents. This method relies on the WordNet framework that provides complete semantic relationship taxonomy between words. Therefore, this extension aims ensure the confidentiality of text documents, but at the same time, it should preserve the general meaning. We apply some measures to evaluate the quality of the protection method relying on information loss.

A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor

Publication Type:

Conference Paper

Source:

24th IFIP TC-11 International Information Security Conference (SEC2009), Springer Boston, Volume 297/2009, Cyprus, p.164-175 (2009)

ISBN:

978-3-642-01243-3

URL:

http://www.springerlink.com/content/l12k23678011l1t2

Keywords:

privacy; anonymity; Tor

Abstract:

Web browsers are becoming the universal interface to reach
applications and services related with these systems. Different
browsing contexts may be required in order to reach them, e.g., use
of VPN tunnels, corporate proxies, anonymisers, etc. By browsing
\emph{context} we mean how the user browsers the Web, including
mainly the concrete configuration of its browser. When the context
of the browser changes, its security requirements also change. In
this work, we present the use of authorisation policies to
automatise the process of controlling the resources of a Web browser
when its context changes. The objective of our proposal is oriented
towards easing the adaptation to the security requirements of the
new context and enforce them in the browser without the need for
user intervention. We present a concrete application of our work as
a \emph{plug-in} for the adaption of security requirements in
Mozilla/Firefox browser when a context of anonymous navigation
through the Tor network is enabled.

Syndicate content