Protecting the Privacy Based on Reasoning in E-Business Using Anonymous

被引:0
作者
Peng, Tao [1 ]
Jiang, Minghua [1 ]
Hu, Ming [1 ]
机构
[1] Wuhan Univ Sci & Engn, Coll Comp Sci, Wuhan, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY, VOL III, PROCEEDINGS, | 2009年
关键词
Privacy; Reasoning; Anonymous; E-Business;
D O I
10.1109/ESIAT.2009.501
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, the E-Commerce plays a very important role in peoples' life, many people like to shop on internet. At the same time, people left so much information in internet, which include the privacy information. Malicious users in internet can get users' privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema to prevent malicious users reasoning privacy information with the information which considered as security information on internet. In this schema, the single information set and multiple information sets are taken into count, based on the relations of the information, some information will be hidden, which can protect the privacy information. This schema will loss some information, but the privacy will protected.
引用
收藏
页码:232 / 235
页数:4
相关论文
共 50 条
[41]   THE CHAIN OF CONSUMER EXPERIENCE BASED ON INTERACTIVITY IN E-BUSINESS [J].
Xiong, Xiaoyuan .
LISS 2011: PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCE, VOL 3, 2011, :91-94
[42]   Accountancy for E-Business Enterprises Based on Cyber Security [J].
Yang, Yu ;
Yin, Zecheng .
INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (06)
[43]   E-business Workflow Security Architecture based on UCON [J].
Wen, Haoyu ;
Ji, Dongxing .
2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, :338-340
[44]   Research of E-Business Security Based on SOAP Protocol [J].
Wang, Yiran .
MANUFACTURING PROCESS TECHNOLOGY, PTS 1-5, 2011, 189-193 :4304-4307
[45]   XML-based e-business frameworks and standardization [J].
Nurmilaakso, JM ;
Kotinurmi, P ;
Laesvuori, H .
COMPUTER STANDARDS & INTERFACES, 2006, 28 (05) :585-599
[46]   An e-Business technical model based on ebXML framework [J].
Ning, C ;
Qizong, W ;
Shiyan, C .
PROCEEDINGS OF THE 2001 INTERNATIONAL CONFERENCE ON INTERNATIONAL BUSINESS IN THE ERA OF ECONOMY GLOBALIZATION, 2001, :188-193
[47]   Research of E-business Application based on Data Mining [J].
Shen Zi-Hao ;
Peng Wei-Ping .
CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, :749-753
[48]   Towards a UDDI based semantic solution for the e-business [J].
Belouadha, Fatima-Zahra ;
Roudies, Ounsa .
2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, :467-472
[49]   A framework for the evolution of e-business based on information technology [J].
Zeng, QF ;
Zhao, WD ;
Huang, LH .
2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, :746-750
[50]   Modus Vivendi of E-Business [J].
Kuzic, Joze ;
Fisher, Julie ;
Scollary, Angela ;
Dawson, Linda ;
Kuzic, Milan ;
Turner, Rod .
PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2005, SECTIONS 1-8 AND POSTER SESSIONS 1-6, 2005, :1192-1201