Repositioning privacy concerns: Web servers controlling URL metadata
Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal...
Ausführliche Beschreibung
Autor*in: |
Ferreira, Rui [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2019transfer abstract |
---|
Umfang: |
17 |
---|
Übergeordnetes Werk: |
Enthalten in: Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications - Khadilkar, Aditi ELSEVIER, 2014, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:46 ; year:2019 ; pages:121-137 ; extent:17 |
Links: |
---|
DOI / URN: |
10.1016/j.jisa.2019.03.010 |
---|
Katalog-ID: |
ELV046687327 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV046687327 | ||
003 | DE-627 | ||
005 | 20230626014146.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191021s2019 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.jisa.2019.03.010 |2 doi | |
028 | 5 | 2 | |a GBV00000000000668.pica |
035 | |a (DE-627)ELV046687327 | ||
035 | |a (ELSEVIER)S2214-2126(18)30258-8 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 660 |q VZ |
082 | 0 | 4 | |a 630 |a 640 |a 580 |q VZ |
084 | |a BIODIV |q DE-30 |2 fid | ||
084 | |a 42.00 |2 bkl | ||
100 | 1 | |a Ferreira, Rui |e verfasserin |4 aut | |
245 | 1 | 0 | |a Repositioning privacy concerns: Web servers controlling URL metadata |
264 | 1 | |c 2019transfer abstract | |
300 | |a 17 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. | ||
520 | |a Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. | ||
700 | 1 | |a Aguiar, Rui L. |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier |a Khadilkar, Aditi ELSEVIER |t Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |d 2014 |g Amsterdam [u.a.] |w (DE-627)ELV028549872 |
773 | 1 | 8 | |g volume:46 |g year:2019 |g pages:121-137 |g extent:17 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.jisa.2019.03.010 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a FID-BIODIV | ||
912 | |a GBV_ILN_99 | ||
912 | |a GBV_ILN_165 | ||
936 | b | k | |a 42.00 |j Biologie: Allgemeines |q VZ |
951 | |a AR | ||
952 | |d 46 |j 2019 |h 121-137 |g 17 |
author_variant |
r f rf |
---|---|
matchkey_str |
ferreiraruiaguiarruil:2019----:eoiinnpiayocrsesresoto |
hierarchy_sort_str |
2019transfer abstract |
bklnumber |
42.00 |
publishDate |
2019 |
allfields |
10.1016/j.jisa.2019.03.010 doi GBV00000000000668.pica (DE-627)ELV046687327 (ELSEVIER)S2214-2126(18)30258-8 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Ferreira, Rui verfasserin aut Repositioning privacy concerns: Web servers controlling URL metadata 2019transfer abstract 17 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Aguiar, Rui L. oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:46 year:2019 pages:121-137 extent:17 https://doi.org/10.1016/j.jisa.2019.03.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 46 2019 121-137 17 |
spelling |
10.1016/j.jisa.2019.03.010 doi GBV00000000000668.pica (DE-627)ELV046687327 (ELSEVIER)S2214-2126(18)30258-8 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Ferreira, Rui verfasserin aut Repositioning privacy concerns: Web servers controlling URL metadata 2019transfer abstract 17 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Aguiar, Rui L. oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:46 year:2019 pages:121-137 extent:17 https://doi.org/10.1016/j.jisa.2019.03.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 46 2019 121-137 17 |
allfields_unstemmed |
10.1016/j.jisa.2019.03.010 doi GBV00000000000668.pica (DE-627)ELV046687327 (ELSEVIER)S2214-2126(18)30258-8 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Ferreira, Rui verfasserin aut Repositioning privacy concerns: Web servers controlling URL metadata 2019transfer abstract 17 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Aguiar, Rui L. oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:46 year:2019 pages:121-137 extent:17 https://doi.org/10.1016/j.jisa.2019.03.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 46 2019 121-137 17 |
allfieldsGer |
10.1016/j.jisa.2019.03.010 doi GBV00000000000668.pica (DE-627)ELV046687327 (ELSEVIER)S2214-2126(18)30258-8 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Ferreira, Rui verfasserin aut Repositioning privacy concerns: Web servers controlling URL metadata 2019transfer abstract 17 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Aguiar, Rui L. oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:46 year:2019 pages:121-137 extent:17 https://doi.org/10.1016/j.jisa.2019.03.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 46 2019 121-137 17 |
allfieldsSound |
10.1016/j.jisa.2019.03.010 doi GBV00000000000668.pica (DE-627)ELV046687327 (ELSEVIER)S2214-2126(18)30258-8 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Ferreira, Rui verfasserin aut Repositioning privacy concerns: Web servers controlling URL metadata 2019transfer abstract 17 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. Aguiar, Rui L. oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:46 year:2019 pages:121-137 extent:17 https://doi.org/10.1016/j.jisa.2019.03.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 46 2019 121-137 17 |
language |
English |
source |
Enthalten in Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications Amsterdam [u.a.] volume:46 year:2019 pages:121-137 extent:17 |
sourceStr |
Enthalten in Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications Amsterdam [u.a.] volume:46 year:2019 pages:121-137 extent:17 |
format_phy_str_mv |
Article |
bklname |
Biologie: Allgemeines |
institution |
findex.gbv.de |
dewey-raw |
660 |
isfreeaccess_bool |
false |
container_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
authorswithroles_txt_mv |
Ferreira, Rui @@aut@@ Aguiar, Rui L. @@oth@@ |
publishDateDaySort_date |
2019-01-01T00:00:00Z |
hierarchy_top_id |
ELV028549872 |
dewey-sort |
3660 |
id |
ELV046687327 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV046687327</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626014146.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191021s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jisa.2019.03.010</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBV00000000000668.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV046687327</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S2214-2126(18)30258-8</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">660</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">630</subfield><subfield code="a">640</subfield><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferreira, Rui</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Repositioning privacy concerns: Web servers controlling URL metadata</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">17</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aguiar, Rui L.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Khadilkar, Aditi ELSEVIER</subfield><subfield code="t">Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications</subfield><subfield code="d">2014</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV028549872</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:46</subfield><subfield code="g">year:2019</subfield><subfield code="g">pages:121-137</subfield><subfield code="g">extent:17</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jisa.2019.03.010</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_99</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.00</subfield><subfield code="j">Biologie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">46</subfield><subfield code="j">2019</subfield><subfield code="h">121-137</subfield><subfield code="g">17</subfield></datafield></record></collection>
|
author |
Ferreira, Rui |
spellingShingle |
Ferreira, Rui ddc 660 ddc 630 fid BIODIV bkl 42.00 Repositioning privacy concerns: Web servers controlling URL metadata |
authorStr |
Ferreira, Rui |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV028549872 |
format |
electronic Article |
dewey-ones |
660 - Chemical engineering 630 - Agriculture & related technologies 640 - Home & family management 580 - Plants (Botany) |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Repositioning privacy concerns: Web servers controlling URL metadata |
topic |
ddc 660 ddc 630 fid BIODIV bkl 42.00 |
topic_unstemmed |
ddc 660 ddc 630 fid BIODIV bkl 42.00 |
topic_browse |
ddc 660 ddc 630 fid BIODIV bkl 42.00 |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
r l a rl rla |
hierarchy_parent_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
hierarchy_parent_id |
ELV028549872 |
dewey-tens |
660 - Chemical engineering 630 - Agriculture 640 - Home & family management 580 - Plants (Botany) |
hierarchy_top_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV028549872 |
title |
Repositioning privacy concerns: Web servers controlling URL metadata |
ctrlnum |
(DE-627)ELV046687327 (ELSEVIER)S2214-2126(18)30258-8 |
title_full |
Repositioning privacy concerns: Web servers controlling URL metadata |
author_sort |
Ferreira, Rui |
journal |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
journalStr |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology 500 - Science |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
zzz |
container_start_page |
121 |
author_browse |
Ferreira, Rui |
container_volume |
46 |
physical |
17 |
class |
660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Ferreira, Rui |
doi_str_mv |
10.1016/j.jisa.2019.03.010 |
dewey-full |
660 630 640 580 |
title_sort |
repositioning privacy concerns: web servers controlling url metadata |
title_auth |
Repositioning privacy concerns: Web servers controlling URL metadata |
abstract |
Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. |
abstractGer |
Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. |
abstract_unstemmed |
Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 |
title_short |
Repositioning privacy concerns: Web servers controlling URL metadata |
url |
https://doi.org/10.1016/j.jisa.2019.03.010 |
remote_bool |
true |
author2 |
Aguiar, Rui L. |
author2Str |
Aguiar, Rui L. |
ppnlink |
ELV028549872 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth |
doi_str |
10.1016/j.jisa.2019.03.010 |
up_date |
2024-07-06T20:53:07.341Z |
_version_ |
1803864440666324992 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV046687327</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626014146.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191021s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jisa.2019.03.010</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBV00000000000668.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV046687327</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S2214-2126(18)30258-8</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">660</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">630</subfield><subfield code="a">640</subfield><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferreira, Rui</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Repositioning privacy concerns: Web servers controlling URL metadata</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">17</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (and complementary) approach would be to design the application namespace to minimise privacy leakage. Our goal is to develop a different practical concept of this approach, where service providers enforce fully transient URL namespaces that intentionally conceal data through encryption. We aim to determine what would be the design challenges and required compromises to make this a feasible technique to protect data privacy. For starters, we gather requirements from the constraints of URLs in general and compatibility issues seen in web applications, and propose a mapping process for a namespace of encrypted URLs. We implement this approach over an existing web development framework, and analyse the outcome workload from different popular websites to measure its impact in various conditions. Based on our results, we discuss critical design and implementation choices, consider deployment issues that were encountered, and what compromises can be made to address them, if the web service providers want to embed user privacy in their services. Based on this analysis it can be concluded that this type of privacy approach is expensive, with a significant impact in performance and deployment costs that increases with the expected degree of privacy, but there is also room for improvement in various areas. Furthermore, privacy implemented in this way is not a replacement for other types of privacy solutions, but rather a complementary or even conflicting approach, driven by entirely different motives.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aguiar, Rui L.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Khadilkar, Aditi ELSEVIER</subfield><subfield code="t">Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications</subfield><subfield code="d">2014</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV028549872</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:46</subfield><subfield code="g">year:2019</subfield><subfield code="g">pages:121-137</subfield><subfield code="g">extent:17</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jisa.2019.03.010</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_99</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.00</subfield><subfield code="j">Biologie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">46</subfield><subfield code="j">2019</subfield><subfield code="h">121-137</subfield><subfield code="g">17</subfield></datafield></record></collection>
|
score |
7.400346 |