Privacy Protecting in E-Business Using Reasoning

被引:0
|
作者
Peng, Tao [1 ]
Jiang, Minghua [1 ]
Hu, Ming [1 ]
机构
[1] Wuhan Univ Sci & Engn, Coll Comp Sci, Wuhan, Peoples R China
来源
2009 IITA INTERNATIONAL CONFERENCE ON SERVICES SCIENCE, MANAGEMENT AND ENGINEERING, PROCEEDINGS | 2009年
关键词
Privacy; Reasoning; Anonymous; E-Business;
D O I
10.1109/SSME.2009.143
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Nowadays, the E-Commerce plays a very important role in peoples' life; many people like to shop on internee At the same time, people left so much information in internet, which include the privacy information. Malicious users in internet can get users' privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema to prevent malicious users reasoning privacy information with the information which considered as security information on internet. In this schema, the single information set and multiple information sets are taken into count, based on the relations of the information, some information will be hidden, which can protect the privacy information. This schema will loss some information, but the privacy will protected
引用
收藏
页码:374 / 377
页数:4
相关论文
共 50 条
  • [1] Protecting the Privacy Based on Reasoning in E-Business Using Anonymous
    Peng, Tao
    Jiang, Minghua
    Hu, Ming
    2009 INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY, VOL III, PROCEEDINGS,, 2009, : 232 - 235
  • [2] Networking security and privacy strategies in e-business
    Tsai, N
    Ching, RKH
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 70 - 73
  • [3] Privacy-based computation model in e-business
    Aburukba, Raafat
    Masaud-Wahaishi, AbdulMutalib
    Ghenniwa, Hamada
    Shen, Weiming
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2009, 47 (17) : 4885 - 4906
  • [4] ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector
    Vlachos, Vasileios
    Katevas, Gerasimos
    Katsidimas, Ioannis
    Kerimakis, Emmanouil
    Nikoletseas, Sotiris
    Panagiotou, Stefanos
    Spirakis, Paul
    25TH PAN-HELLENIC CONFERENCE ON INFORMATICS WITH INTERNATIONAL PARTICIPATION (PCI2021), 2021, : 362 - 368
  • [5] Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business
    Yee, George
    Korba, Larry
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2005, 1 (01) : 54 - 69
  • [6] Pseudonym and Privacy Using Quantum Key Distribution (QKD) in E-business
    Setapa, Sharipah
    Abd Aziz, Norazah
    Khalid, Mohd Aminudin Mohd
    Zaba, Muhammad Reza
    Abd Kadir, Azimah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 151 - 155
  • [7] Security and Privacy in IoT based E-Business and Retail
    Kaushik, Keshav
    Dahiya, Susheela
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 78 - 81
  • [8] FEATURES OF E-BUSINESS AND E-COMMERCE WITH A REFLECTION ON PRIVACY IN THE DIGITAL AGE
    Noninska, Irina
    Romansky, Radi
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2023, 15 (03): : 115 - 126
  • [9] Modelling e-business security using business processes
    Nachtigal, S.
    Mitchell, C. J.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +
  • [10] An E-business Chatbot using AIML and LSA
    Thomas, N. T.
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 2740 - 2742