메뉴 건너뛰기




Volumn 8, Issue 4, 2010, Pages 31-39

Dialing privacy and utility: A proposed data-sharing framework to advance internet research

Author keywords

data privacy risk management; information privacy; information sharing; Internet measurement; network security

Indexed keywords

COMMERCIAL PRESSURE; CYBER SECURITY; DATA SHARING; ETHICAL BEHAVIOR; INFORMATION SHARING; INTERNET MEASUREMENT; INTERNET RESEARCH; NETWORK DATA; OPERATIONAL DATA; POLICY FRAMEWORK; PRIVACY RISKS; PRIVACY-ENHANCING TECHNOLOGIES;

EID: 77955143560     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2010.57     Document Type: Article
Times cited : (25)

References (13)
  • 2
    • 42149117425 scopus 로고    scopus 로고
    • Issues and etiquette concerning use of shared measurement data
    • ACM Press
    • M. Allman and V. Paxson, "Issues and Etiquette Concerning Use of Shared Measurement Data," Proc. Internet Measurement Conf. (IMC 07), ACM Press, pp. 135-140.
    • Proc. Internet Measurement Conf. (IMC 07) , pp. 135-140
    • Allman, M.1    Paxson, V.2
  • 3
    • 81455137141 scopus 로고    scopus 로고
    • Guide to Protecting the Confidentiality of Personally Identifi able Information
    • Guide to Protecting the Confidentiality of Personally Identifi able Information, US Nat'l Inst. of Standards and Technology, 2009.
    • (2009) US Nat'l Inst. of Standards and Technology
  • 4
    • 77955131160 scopus 로고    scopus 로고
    • Amending the ecpa to enable a culture of cybersecurity research
    • A. Burstein, "Amending the ECPA to Enable a Culture of Cybersecurity Research," Harvard J. Law & Technology, vol.22, no.1, 2008, pp. 167-222.
    • (2008) Harvard J. Law & Technology , vol.22 , Issue.1 , pp. 167-222
    • Burstein, A.1
  • 5
    • 77958076098 scopus 로고    scopus 로고
    • The role of network trace anonymization under attack
    • M. Burkhart et al., "The Role of Network Trace Anonymization under Attack," ACM SIGCOMM Computer Comm. Rev., vol.40, no.1, 2009, pp. 5-11.
    • (2009) ACM SIGCOMM Computer Comm. Rev. , vol.40 , Issue.1 , pp. 5-11
    • Burkhart, M.1
  • 9
    • 70349108966 scopus 로고    scopus 로고
    • De-Identified data and third party data mining: The risk of re-identification of personal Information
    • Sept.
    • C. Porter, "De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information," Shilder J. Law, Comm., and Technology, vol.3, 23 Sept. 2008; www.lctjournal.washington.edu/ Vol5/a03Porter.html.
    • (2008) Shilder J. Law, Comm., and Technology , vol.3 , pp. 23
    • Porter, C.1
  • 10
    • 50249142450 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • IEEE CS Press
    • A. Narayanan and V. Shmatikov, "Robust De-anonymization of Large Sparse Datasets," IEEE Symp. Security and Privacy, IEEE CS Press, 2008, pp. 111-125.
    • (2008) IEEE Symp. Security and Privacy , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 11
    • 33750631971 scopus 로고    scopus 로고
    • eds., Nat'l Academies Press
    • C.B. Duke et al., eds., Network Science, Nat'l Academies Press, 2006.
    • (2006) Network Science
    • Duke, C.B.1
  • 12
    • 0007129868 scopus 로고
    • OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
    • OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Organization for Economic Cooperation and Development, 1980.
    • (1980) Organization for Economic Cooperation and Development
  • 13
    • 77749333197 scopus 로고    scopus 로고
    • Theory of disclosure for security and competitive reasons: Open source, proprietary software, and government agencies
    • paper 49
    • P.A. Swire, "Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Agencies," Houston Law Rev., vol.42, no.5, 2006, paper 49.
    • (2006) Houston Law Rev. , vol.42 , Issue.5
    • Swire, P.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.