توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقاله‌های نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده می‌شوند.
۱K–Anonymity Privacy Protection Using Ontology
اطلاعات انتشار: چهاردهمین کنفرانس بین المللی سالانه انجمن کامپیوتر ایران، سال
تعداد صفحات: ۴
Blinded data mining is a branch of data mining technique which is focused on protecting user privacy. To mine sensitive data such as medical information, it is desirable to protect privacy and there is not worry about revealing personalized data. In this paper a new approach for blinded data mining is suggested. It is based on ontology and k–anonymity generalization method. Our method generalizes a private table by considering table fields ontology, so that each tuple will become k–anonymous and less specific to not reveal sensitive information. This method is implemented using protégé and java for evaluation.<\div>

۲Mobile Database Security Assessment Against Location Detection Attacks Using Blind Signature
نویسنده(ها): ، ،
اطلاعات انتشار: دهمین کنفرانس دانشجویی مهندسی برق ایران، سال
تعداد صفحات: ۸
Mobile database system is an emerging research area which has recently attained considerable concerns. The idea of accessing data any where and any time, poses new security problems in mobile environments. One of these security issues is maintaining the mobile user location privacy. The objective is to prohibit deducing user location and movement through eavesdropping or accessing metadata which is stored in database tables.This paper presents a new method to protect user location privacy for mobile database based on blind signature. In addition, the proposed technique preserves confidentiality of the database content.<\div>

۳A Reputation Based Trust Model forWeb Service Selection
نویسنده(ها): ،
اطلاعات انتشار: هشتمین کنفرانس بین المللی تجارت الکترونیک با رویکرد بر اعتماد الکترونیکی، سال
تعداد صفحات: ۶
Service Oriented Architecture is a new and evolving approach that makes building distributed applications and presenting software performance in form of componentsthat can be discovered in network using loose connection and high independence. The technology that enables the creation and sharing of these autonomous pieces of software are web services. The application of web services technology in areas such as e–commerce and e–learning is on the rise. The problem of selecting the best web service among the candidate web services is one of the major challenges in open and dynamic environments in which new consumers, providers and servicesmay continuously be added to the system or leave the system. The criterion that is mostly used for selecting web services in other studies is the quality of service. However, it is possible that a provider exaggerates the characteristics of its service quality in order to obtain more consumers and thus make more profit. Therefore, in case of exaggerated descriptions by dishonest providers, web service selection algorithm will fail. Hence, if the service quality criterion is to be used in theselection of web services, a solution must be provided to address the exaggerated descriptions challenge. To this end, in this study, a new trust model has been developed for the selection phase that considers trust and reputation along with the quality of service as selection criteria. In this model various aspects of trust will be examined in order to cope with the impact of misleading feedback. Furthermore, personalized reputation is used as well as general reputation. This model uses social network analysis in order to provide a personalized offer. Finally, a selection procedure based on web services trust is presented in which the proposed model is used. By taking intoaccount the relationship of trust between all the components involved in the composition (services, providers, and consumers), a web service will be offered to the user which is the most reliable one. Assessments made indicate the high tolerability of this model against fake descriptions compared to other models<\div>
نمایش نتایج ۱ تا ۳ از میان ۳ نتیجه