Privacy Enhancing Technologies: 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections.

The 24 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing and improvement. The papers both from academia and industry present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

Author(s): Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu (auth.), George Danezis, Philippe Golle (eds.)
Series: Lecture Notes in Computer Science 4258 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 434
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Information Storage and Retrieval; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Privacy for Public Transportation....Pages 1-19
Ignoring the Great Firewall of China....Pages 20-35
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook....Pages 36-58
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks....Pages 59-77
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management....Pages 78-98
Privacy Injector — Automated Privacy Enforcement Through Aspects....Pages 99-117
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises....Pages 118-134
One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique....Pages 135-151
Protecting Privacy with the MPEG-21 IPMP Framework....Pages 152-171
Personal Rights Management – Taming Camera-Phones for Individual Privacy Enforcement....Pages 172-189
Improving Sender Anonymity in a Structured Overlay with Imprecise Routing....Pages 190-207
Selectively Traceable Anonymity....Pages 208-222
Valet Services: Improving Hidden Servers with a Personal Touch....Pages 223-244
Blending Different Latency Traffic with Alpha-mixing....Pages 245-257
Private Resource Pairing....Pages 258-276
Honest-Verifier Private Disjointness Testing Without Random Oracles....Pages 277-294
A Flexible Framework for Secret Handshakes....Pages 295-315
On the Security of the Tor Authentication Protocol....Pages 316-331
Optimal Key-Trees for Tree-Based Private Authentication....Pages 332-350
Simple and Flexible Revocation Checking with Privacy....Pages 351-367
Breaking the Collusion Detection Mechanism of MorphMix....Pages 368-383
Linking Anonymous Transactions: The Consistent View Attack....Pages 384-392
Preserving User Location Privacy in Mobile Data Management Infrastructures....Pages 393-412
The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment....Pages 413-429
Back Matter....Pages -