期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Sensitive Information Protection Model Based on Bayesian Game
1
作者 Yuzhen Liu Zhe Liu +3 位作者 Xiaoliang Wang Qing Yang Guocai Zuo Frank Jiang 《Computers, Materials & Continua》 SCIE EI 2022年第10期883-898,共16页
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of s... A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service.We quantified the sensitive level of information according to the user’s personalized sensitive information protection needs.Based on the probability distribution of sensitive level and attacker’s knowledge background type,the strategy combination of service provider and attacker was analyzed,and a game-based sensitive information protection model was constructed.Through the combination of strategies under Bayesian equilibrium,the information entropy was used to measure the leakage of sensitive information.Furthermore,in the paper the influence of the sensitive level of information and the attacker’s knowledge background on the strategy of both sides of the game was considered comprehensively.Further on,the leakage of the user’s sensitive information was measured.Finally,the feasibility of the model was described by experiments. 展开更多
关键词 sensitive information game theory Bayesian equilibrium sensitive level information entropy
下载PDF
Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation
2
作者 Bailing LIU Feng XIAO Ke DENG 《Frontiers of Computer Science》 SCIE EI CSCD 2011年第2期135-147,共13页
Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ... Automated trust negotiation (ATN) is an approach to establishing mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. In ATN, there are conflicts between negotiation success and sensitive information protection, that is, these two needs cannot be given priority at the same time, which is a challenging problem to resolve. In this paper, a language independent ATN framework, which is dynamic, flexible and adaptive, is presented to address this problem, ensuring negotiation success without sensitive information leakage. This framework is independent of the policy language which is used. However, the language used should have the capability to specify all kinds of sensitive information appearing in credentials and policies, and support the separation of attribute disclosure from credential disclosure. Thus definitions of new language features, which can be incorporated into existing policy languages, are given, enabling the used language to support the capabilities mentioned above. 展开更多
关键词 automated trust negotiation (ATN) negotiation success sensitive information protection FRAMEWORK policy language
原文传递
A Method of Eliminating Information Disclosure in View Publishing 被引量:4
3
作者 LIU Guohua GAO Shihong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1753-1756,共4页
Although it is convenient to exchange data by publishing view, but it may disclose sensitive information. The problem of how to eliminate information disclosure becomes a core problem in the view publishing process. I... Although it is convenient to exchange data by publishing view, but it may disclose sensitive information. The problem of how to eliminate information disclosure becomes a core problem in the view publishing process. In order to eliminate information disclosure, deciding view security algorithm and eliminating information disclosure algorithm are proposed, and the validity of the algorithms are proved by experiment. The experimental results showing, deciding view security algorithm can decide the safety of a set of views under prior knowledge, and eliminating information disclosure algorithm can eliminate disclosure efficiently. 展开更多
关键词 view publishing sensitive information prior knowledge information disclosure
下载PDF
Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services 被引量:5
4
作者 Xiao PAN Weizhang CHEN +2 位作者 Lei WU Chunhui PIAO Zhaojun HU 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第2期370-386,共17页
Privacy preservation has recently received considerable attention for location-based mobile services. A lot of location cloaking approaches focus on identity and location protection, but few algorithms pay attention t... Privacy preservation has recently received considerable attention for location-based mobile services. A lot of location cloaking approaches focus on identity and location protection, but few algorithms pay attention to prevent sensitive information disclosure using query semantics. In terms of personalized privacy requirements, all queries in a cloaking set, from some user's point of view, are sensitive. These users regard the privacy is breached. This attack is called as the sensitivity homogeneity attack. We show that none of the existing location cloaking approaches can effectively resolve this problem over road networks. We propose a (K, L, P)-anonymity model and a personalized privacy protection cloaking algorithm over road networks, aiming at protecting the identity, location and sensitive information for each user. The main idea of our method is first to partition users into different groups as anonymity requirements. Then, unsafe groups are adjusted by inserting relaxed conservative users considering sensitivity requirements. Finally, segments covered by each group are published to protect location information. The efficiency and effectiveness of the method are validated by a series of carefully designed experiments. The experimental results also show that the price paid for defending against sensitivity homogeneity attacks is small. 展开更多
关键词 query semantics sensitive information privacy protection road networks location based services
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部