Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 16 von 23
2006 IEEE International Symposium on Consumer Electronics, 2006, p.1-5
2006
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
A Personal Information Leakage Prevention Method on the Internet
Ist Teil von
  • 2006 IEEE International Symposium on Consumer Electronics, 2006, p.1-5
Ort / Verlag
IEEE
Erscheinungsjahr
2006
Quelle
IEEE Electronic Library (IEL)
Beschreibungen/Notizen
  • In this paper, we propose a method for preventing personal information leakage on the Internet. The leakage of the personal information might cause severe problems such as privacy violation, impersonation, spam mail, and financial fraud. The main ways of the personal information leakage are the leakage of the personal information registered in Web site, the Internet phishing, and the spyware. The basic idea of our method for preventing these types of personal information leakage is "do not send the personal information to a hazardous recipient". Every network packet transferred from a user's PC to a server via the Internet is inspected to check if the packet contains the user's personal information. When a packet containing personal information is detected, a decision about safety of the transfer is made. After decision is made, the packet sent to an unsafe destination is dismissed. The decision is made based on the predefined user control policy. The user policy specifies the safeness of a transfer in considering the information such as type of transferred personal information, the application that sends the packet and the trustworthiness of the recipient. The destination's trustworthiness is managed and provided by a trusted third party. In this paper, we present the explanation of information leakage problem and the description of related work. The presentation of our model for controlling personal information transfer and a description of the system architecture for implementing our model is included. And some security analysis of our method that shows the effectiveness of the proposed method is also presented
Sprache
Englisch
Identifikatoren
ISBN: 9781424402168, 1424402166
ISSN: 0747-668X
DOI: 10.1109/ISCE.2006.1689487
Titel-ID: cdi_ieee_primary_1689487

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX