Private anonymous data access
… private database which only she can access. In this case we want to maintain privacy and
anonymity … the content of the data, which clients are accessing their data, or what parts of their …
anonymity … the content of the data, which clients are accessing their data, or what parts of their …
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
… created with an access structure, which specifies the encryption policy, and private keys are
… if and only if his attributes in the private key satisfy the access tree specified in the ciphertext. …
… if and only if his attributes in the private key satisfy the access tree specified in the ciphertext. …
Private updates to anonymous databases
A Trombetta, E Bertino�- …�International Conference on Data�…, 2006 - ieeexplore.ieee.org
… with a tuple owned by Bob, is still k-anonymous. Suppose moreover that access to the
database is strictly controlled, because for example data are used for experiments that need to be …
database is strictly controlled, because for example data are used for experiments that need to be …
Privacy preserving data sharing with anonymous ID assignment
LA Dunning, R Kresman�- IEEE transactions on information�…, 2012 - ieeexplore.ieee.org
… mining, collision avoidance in communications and distributed database access. The … The
problem of sharing privately held data so that the individuals who are the subjects of the data …
problem of sharing privately held data so that the individuals who are the subjects of the data …
Anonymous data v. personal data-false debate: an EU perspective on anonymization, pseudonymization and personal data
S Stalla-Bourdillon, A Knight�- Wis. Int'l LJ, 2016 - HeinOnline
… anonymization in big data, together with other techniques and data access controls, which
it … easily understandable by private actors and especially data analysists and data scientists …
it … easily understandable by private actors and especially data analysists and data scientists …
Private and anonymous data storage and distribution in cloud
… The scheme achieves the data storage correctness, allows the authenticated customer to
access the data and data error localization, ie, the identification of misbehaving servers. In [2], …
access the data and data error localization, ie, the identification of misbehaving servers. In [2], …
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
… data is a desirable counter measure against data theft. But how, then, can the investigator,
such as the police or a secret service, search the data … only be given access to data that fulfills …
such as the police or a secret service, search the data … only be given access to data that fulfills …
An anonymous data access scheme for VANET using pseudonym-based cryptography
C Wang, D Shi, X Xu, J Fang�- Journal of Ambient Intelligence and�…, 2016 - Springer
… \(\text {Extract}(mpk, \mathsf {PN}_{\it X})\): to generate a pseudonym and the corresponding
private key, an anonymous entity X chooses \(k_X \overset{\$}{\leftarrow } {\mathbf {{Z}}}_{q}^{…
private key, an anonymous entity X chooses \(k_X \overset{\$}{\leftarrow } {\mathbf {{Z}}}_{q}^{…
[HTML][HTML] A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and�…
KH Jones, DV Ford, C Jones, R Dsilva…�- Journal of biomedical�…, 2014 - Elsevier
… data access agreement for responsible data utilisation and understanding that misconduct
will be subject to disciplinary action. Data access … Gateway via a Virtual Private Network (VPN) …
will be subject to disciplinary action. Data access … Gateway via a Virtual Private Network (VPN) …
Anonymous tokens with public metadata and applications to private contact tracing
… We give the adversary access to two signing oracles: One uses the adversary’s chosen … ,
we present anonymous tokens with public and private metadata and anonymous tokens with …
we present anonymous tokens with public and private metadata and anonymous tokens with …