Protecting the Privacy Based on Reasoning in E-Business Using Anonymous

被引:0
作者
Peng, Tao [1 ]
Jiang, Minghua [1 ]
Hu, Ming [1 ]
机构
[1] Wuhan Univ Sci & Engn, Coll Comp Sci, Wuhan, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY, VOL III, PROCEEDINGS, | 2009年
关键词
Privacy; Reasoning; Anonymous; E-Business;
D O I
10.1109/ESIAT.2009.501
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, the E-Commerce plays a very important role in peoples' life, many people like to shop on internet. At the same time, people left so much information in internet, which include the privacy information. Malicious users in internet can get users' privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema to prevent malicious users reasoning privacy information with the information which considered as security information on internet. In this schema, the single information set and multiple information sets are taken into count, based on the relations of the information, some information will be hidden, which can protect the privacy information. This schema will loss some information, but the privacy will protected.
引用
收藏
页码:232 / 235
页数:4
相关论文
共 50 条
[31]   Customer based classification of atomic e-business models [J].
Zeng, Fenghuan ;
Tan, Peiqiang .
Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, :1122-1128
[32]   Logistics Mode Selection of E-Business That is Based on AHP [J].
Ren, Keshe .
NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, :362-366
[33]   E-business processes and e-Business Process Modelling: a state-of-the-art overview [J].
Melao, Nuno .
INTERNATIONAL JOURNAL OF SERVICES TECHNOLOGY AND MANAGEMENT, 2009, 11 (03) :293-322
[34]   Measurement of Firm E-business Capability to Manage and Improve Its E-business Applications [J].
Yoon, Chui Young .
ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 :101-107
[35]   A security architecture for E-business based on grid technology [J].
Zhou, Ning ;
Zhang, Fangfang ;
Yu, Xiaosheng .
FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, :1352-1356
[36]   Integrated knowledge supply chain based on e-business [J].
Guo, YH ;
Qian, XS .
PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2: INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT IN THE GLOBAL ECONOMY, 2005, :192-194
[37]   The Design of the Integrated E-Business System based on CPC [J].
Ying Wei-ping ;
Luo Chao-Sheng ;
Zhao Yun .
ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, :182-+
[38]   A Method of Recommendation Based on Affection Semantic in E-Business [J].
Wang Gang ;
Yin Fenxia .
SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 :369-+
[39]   Coordination mechanisms in the supply chain based e-business [J].
Li, SC ;
Cui, XX ;
Liang, GQ .
SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, :68-72
[40]   THE CHAIN OF CONSUMER EXPERIENCE BASED ON INTERACTIVITY IN E-BUSINESS [J].
Xiong, Xiaoyuan .
LISS 2011: PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCE, VOL 3, 2011, :91-94