期刊文献+

第三方追踪的安全研究 被引量:5

Research on security of third-party tracking
下载PDF
导出
摘要 第三方追踪可以获得用户的浏览历史等隐私信息,如何保护第三方追踪带来的隐私威胁问题成为安全领域的重要研究内容。首先介绍第三方追踪的基本概念、特点及安全现状,并结合第三方应用的类型,总结了第三方追踪存在的隐私威胁。然后从有状态追踪和无状态追踪2个方面介绍第三方追踪的技术,并对第三方追踪防御的相关研究进行了分析和比较。最后总结第三方追踪中研究领域的开放性问题和发展方向。 Third-party tracking can record users' behaviors across many websites.Increasing attention has been paid to the area of third-party tracking due to the fact that user's privacy protection is causing wider concern.The basic concept and present development were introduced.And security risks were also summarized.Then main technology of third-psrty tracking was intrduced from stateful tracking and stateless tracking aspects.Furthermore,several existing defenses of third-party tracking were described and compared.Finally,some hot research topics were given and the future research directions were discussed.
出处 《通信学报》 EI CSCD 北大核心 2014年第9期1-11,共11页 Journal on Communications
基金 国家自然科学基金资助项目(61272481 61303239) 北京市自然科学基金资助项目(4122089) 国家发展和改革委员会2011年信息安全专项基金资助项目(发改办高技[2012]1424) 中国科学院大学校长基金资助项目(Y25102HN00)~~
关键词 信息安全 隐私 第三方追踪 WEB information security privacy third-party tracking Web
  • 相关文献

参考文献55

  • 1LIBERT T.Privacy implications of health information seeking on the Web[EB/OL].http://papers.ssm.com/so13/papers.cfm?abstractid-2423 006.2014.
  • 2NIKIFORAKIS N,KAPRAVELOS A,JOOSEN W,et al.Cookieless monster:exploring the ecosystem of Web-based device fingerprinting[A].2013 IEEE Symposium on Security and Privacy[C].2013.541-555.
  • 3MAYER J R,MITCHELL J C.Third-party Web tracking:policy and technology[A].IEEE Symposium on Security and Privacy (SP)[C].2012.413-427.
  • 4MAYER J.Tracking the trackers:to catch a history thief[EB/OL].http://cyberlaw.stanford.edu/node/6695,2011.
  • 5MAYER J.Tracking the trackers:where everybody knows your username[EB/OL].http://cyberlaw.stanford.edu/blog/2011/10/tracking-tracke rs-where-everybody-knows-your-username,2011.
  • 6KRISHNAMURTHY B,NARYSHKIN K,WILLS C.Privacy leakage vs.protection measures:the growing disconnect[A].Web 2.0 Security and Privacy Workshop[C].2011.1-10.
  • 7MALANDRINO D,SCARANO V.Privacy leakage on the Web:diffusion and countermeasures[J].Computer Networks,2013,57:2833-2855.
  • 8ROESNER F,KOHNO T,WETHERALL D.Detecting and defending against third-party tracking on the Web[A].Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation[C].2012.12-12.
  • 9LI Z,ZHANG K,XIE Y,et al.Knowing your enemy:understanding and detecting malicious web advertising[A].Proceedings of the 2012 ACM Conference on Computer and Communications Security[C].2012.674-686.
  • 10BARFORD P,CANADI I,KRUSHEVSKAJA D,et al.Adscape:harvesting and analyzing online display ads[A].Proceedings of the 23rd International Conference on World Wide Web[C].2014.597-608.

同被引文献6

引证文献5

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部