期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Decentralized Mobile SNS Architecture and Its Personal Information Management Mechanism 被引量:2
1
作者 LIU Zhihan YUAN Quan LIU Lu 《China Communications》 SCIE CSCD 2016年第2期189-199,共11页
Mobile SNS popular topics of mobile is one of the most Internet. In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources, t... Mobile SNS popular topics of mobile is one of the most Internet. In order to fulfill the user demand for self-maintained independent social network and ensure the privacy of their personal information and resources, the paper proposes system architecture of decentralized mobile SNS.In the temporary scenarios, the system makes use of the existent specification of FOAF (Friend- of-a-Friend) to describe users' personal information and act as a certificate to be identified by SNS sites. Ticket-based Access Authorization System (TAAS) is provided to grant permission to acquire resources on personal portal. Meanwhile, the mechanism and algorithm are devised for user profile complete deletion when users are going to quit the service for the temporary scenarios. 展开更多
关键词 mobile SNS DECENTRALIZED temporaryscenarios personal information management access authorization privacy protection
下载PDF
Personal Information Self-Management:A Survey of Technologies Supporting Administrative Services
2
作者 Paul Marillonnet Maryline Laurent Mikaël Ates 《Journal of Computer Science & Technology》 SCIE EI CSCD 2021年第3期664-692,共29页
This paper presents a survey of technologies for personal data self-management interfacing with administrative and territorial public service providers.It classifies a selection of scientific technologies into four ca... This paper presents a survey of technologies for personal data self-management interfacing with administrative and territorial public service providers.It classifies a selection of scientific technologies into four categories of solutions:Personal Data Store(PDS),Identity Manager(IdM),Anonymous Certificate System and Access Control Delegation Architecture.Each category,along with its technological approach,is analyzed thanks to 18 identified functional criteria that encompass architectural and communication aspects,as well as user data lifecycle considerations.The originality of the survey is multifold.First,as far as we know,there is no such thorough survey covering such a panel of a dozen of existing solutions.Second,it is the first survey addressing Personally Identifiable Information(PII)management for both administrative and private service providers.Third,this paper achieves a functional comparison of solutions of very different technical natures.The outcome of this paper is the clear identification of functional gaps of each solution.As a result,this paper establishes the research directions to follow in order to fill these functional gaps. 展开更多
关键词 personal information management privacy enforcement user-centric solution technological survey
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部