49,071 research outputs found

    Anonymous reputation based reservations in e-commerce (AMNESIC)

    Get PDF
    Online reservation systems have grown over the last recent years to facilitate the purchase of goods and services. Generally, reservation systems require that customers provide some personal data to make a reservation effective. With this data, service providers can check the consumer history and decide if the user is trustable enough to get the reserve. Although the reputation of a user is a good metric to implement the access control of the system, providing personal and sensitive data to the system presents high privacy risks, since the interests of a user are totally known and tracked by an external entity. In this paper we design an anonymous reservation protocol that uses reputations to profile the users and control their access to the offered services, but at the same time it preserves their privacy not only from the seller but the service provider

    Bullying in middle school: the role of school counselors and teachers in preventing bullying

    Get PDF
    Master's Project (M.Ed.) University of Alaska Fairbanks, 2017Research suggests that bullying is a problem in schools throughout the nation. Children spend the vast majority of their life attending school. School counselors and teachers are in a unique position to identify, prevent and educate students about bullying. The purpose of this project was to examine the role of school counselors and teachers in the Fairbanks North Star Borough School District (FNSBSD) in preventing bullying in their schools. The participants of this study were 8 school counselors and teachers from four middle schools in the FNSBSD. Data for this research was collected using an anonymous online survey utilizing www.SurveyMonkey.com. The results of the survey indicated that bullying is an issue in the four middle schools selected for the study in FNSBSD. Of the four major types of bullying discussed in my research (cyber, relation, physical, and verbal), there was a consensus among the participants that cyber and relational bullying were the most prevalent and problematic in their schools. Recommendations for future research include expanding on this study to include a larger sample of schools and participants, suggestions for strengthening staff training and implementing school based youth courts in FNSBSD schools as part of the bully intervention and prevention program

    Introducing Accountability to Anonymity Networks

    Full text link
    Many anonymous communication (AC) networks rely on routing traffic through proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes risk sanctions by law enforcement if users commit illegal actions through the AC network. We present BackRef, a generic mechanism for AC networks that provides practical repudiation for the proxy nodes by tracing back the selected outbound traffic to the predecessor node (but not in the forward direction) through a cryptographically verifiable chain. It also provides an option for full (or partial) traceability back to the entry node or even to the corresponding user when all intermediate nodes are cooperating. Moreover, to maintain a good balance between anonymity and accountability, the protocol incorporates whitelist directories at exit proxy nodes. BackRef offers improved deployability over the related work, and introduces a novel concept of pseudonymous signatures that may be of independent interest. We exemplify the utility of BackRef by integrating it into the onion routing (OR) protocol, and examine its deployability by considering several system-level aspects. We also present the security definitions for the BackRef system (namely, anonymity, backward traceability, no forward traceability, and no false accusation) and conduct a formal security analysis of the OR protocol with BackRef using ProVerif, an automated cryptographic protocol verifier, establishing the aforementioned security properties against a strong adversarial model

    Dining Cryptographers with 0.924 Verifiable Collision Resolution

    Get PDF
    The dining cryptographers protocol implements a multiple access channel in which senders and recipients are anonymous. A problem is that a malicious participant can disrupt communication by deliberately creating collisions. We propose a computationally secure dining cryptographers protocol with collision resolution that achieves a maximum stable throughput of 0.924 messages per round and which allows to easily detect disruptors.Comment: 11 pages, 3 figure

    2007 ILRF Annual Report

    Get PDF
    Provides an overview of the progress and setbacks for the International Labor Rights Forum’s various campaigns in 2007, with a particular focus on the progress made in the area of child labor

    Ethical Leadership in Kazakhstan: An Exploratory Study

    Get PDF
    This study measured ethical leadership perceptions utilizing a new corporate culture scale in a Central Asian country. Ethical leadership ratings from 103 Kazakhstani employees were used to determine how they perceived their managers in terms of being moral people and moral managers. Results indicate that managers are perceived as relatively weaker moral managers as compared to moral persons. Holding employees accountable for their actions is the lowest rated aspect of the moral manager. Definitions of moral persons and moral managers in Kazakhstan vary somewhat from an American culture-oriented ethical leadership model. Implications for theory and practice are discussed

    Hang With Your Buddies to Resist Intersection Attacks

    Full text link
    Some anonymity schemes might in principle protect users from pervasive network surveillance - but only if all messages are independent and unlinkable. Users in practice often need pseudonymity - sending messages intentionally linkable to each other but not to the sender - but pseudonymity in dynamic networks exposes users to intersection attacks. We present Buddies, the first systematic design for intersection attack resistance in practical anonymity systems. Buddies groups users dynamically into buddy sets, controlling message transmission to make buddies within a set behaviorally indistinguishable under traffic analysis. To manage the inevitable tradeoffs between anonymity guarantees and communication responsiveness, Buddies enables users to select independent attack mitigation policies for each pseudonym. Using trace-based simulations and a working prototype, we find that Buddies can guarantee non-trivial anonymity set sizes in realistic chat/microblogging scenarios, for both short-lived and long-lived pseudonyms.Comment: 15 pages, 8 figure
    • …
    corecore