Facebook founder Mark Zuckerberg has tried to recast the desire for privacy as a desire for control over our digital identities. Facebook创始人马克•扎克伯格试图将人们对隐私的渴望改造成为对控制个人数字信息的渴望。
I hope the methods mentioned in this article will inspire social network developers to consider privacy control design and implementation. 我希望提到的这些方法能在社交网络开发人员考虑隐私控制设计和实现时带来启发。
Figure 3 shows the different search results after the privacy control feature is enabled. 图3显示的是在隐私控制特性启用后得到的不同查询结果。
Let's follow this logic to see how the privacy control feature works in the system. 让我们沿着这条思路看看隐私控制特性如何在系统中起作用。
So, we need to carefully classify the information first, and then apply different privacy policies on it to balance the sharing with privacy control requirements. 因此,我们需要首先将信息分类,然后运用不同的隐私策略以均衡分享和隐私控制需求。
First, we determined the privacy control requirements. 首先,我们确定隐私控制需求。
That's all for how the privacy control feature works. 这就是隐私控制特性的工作原理。
The issue of online privacy has drawn increasing concerns from consumers, and the Obama administration has called for a privacy bill of rights that would give users more control over their data. 现在网络隐私问题越来越为消费者所关注,奥巴马政府呼吁通过隐私权法案,这一法案将给用户更多对个人资料的控制权。
The White House proposed on Thursday a privacy bill of rights that would give consumers more control over their data but relies heavily for now on voluntary commitments by Internet companies like Google Inc and Facebook. 美国白宫本周四提出一项隐私权议案,增加了用户对自己网络信息的控制权,但其实施目前仍严重有赖于谷歌和Facebook等网络公司的自愿承诺。
You can, of course, customize privacy settings to control who sees your info. 当然,你能够设置哪些人可以看到你的这些信息以保护隐私。
Visit your privacy page and control who can see photos, who can tag you in photos, who can post comments, and so on. 控制好你私人页面的访问权限,谁可以看照片,谁可以发表评论,等等。
On March 16th the Obama administration announced that it intends to work with Congress to produce "a privacy bill of rights" giving American consumers greater control over how their information is collected and used by digital marketers. 3月16日,奥巴马政府宣布欲同国会合作,出台“一项隐私权利法案”,赋予美国用户更大权利,控制数字营销商如何收集利用自己的信息。
Research on Method for Privacy Control in Ubiquitous Computing Based on Semantic Rule 基于语义规则的普适计算隐私控制方法研究
Let me show you how to uninstall Spyware and Privacy Control Center before your computer is in flames. 让我告诉您如何卸载间谍软件和隐私控制中心收到您的计算机是在燃烧。
As the main supporting platform for network service of next generation, IP technique itself has some problems to be solved. One outstanding is security of IP protocol, such as privacy, authorization, and access control of network data. 作为下一代网络应用业务的主要支撑平台,lP技术本身存在一些有待解决的问题,比较突出的是IP协议的安全问题,如网络数据的私有性、授权、访问控制等方面。
Focus on this paper describes in detail the information privacy, authentication, acces control and the authentication key protocol in personal communication systems. 文章的重点是描述个人通信系统中的信息保密、鉴别、访问控制和鉴别密钥协议。
Research on Privacy Protection of Database Based on Inference Control 基于推理控制的数据库隐私保护
After analyzing the threatens for privacy are brought by certificate-based authentication and access control, the paper shows some important technologies such as the key-oriented authorization certificate, the certificate reduction, temporary and task-specifi key so as to reduce threatens for privacy in using digital certificate. 论文深入分析了基于证书的认证和访问控制所带来的对隐私的威胁,应用面向密钥的授权证书、证书约简、临时和任务特定密钥等技术以减少使用数字证书带来对隐私的威胁。
The importance of the security of database of forestry enterprise information systems and the security characteristics of the relevant databases are analyzed in the article. Three methods are presented here for ensuring security: password protection, data privacy and access control. 本文对林业企业信息系统中数据库安全的重要性、数据库的主要安全特点等进行了分析,并列举了数据库安全性控制的三种方法:即口令保护、数据加密和存取控制。
It is demonstrated that this approach, which improves data privacy, data integrality, access control and key management, has better performance based on better security. 该方法在数据保密性、数据完整性、访问控制以及密钥管理等方面做了改进,并被证明在保证更好的安全性的基础上提高了性能。
Based on the two protocols, a privacy preserving protocol is proposed for the access control policies and credentials. 最后基于策略计算协议和属性相等测试协议提出了策略和证书的隐私保护协议。
Privacy preservation of access control policy and credential for grid entities is an important aspect of grid security, whose importance has been increasingly highlighted with the wide application of grid technology. 网格访问控制机制中网格实体的访问控制策略和证书的隐私保护是网格安全的一个重要方面,其重要性随着网格技术的进一步广泛应用而日益突出。
The right to privacy in modern sense is a right to control personal information, which requires full regulation on the collection, use, keep and transfer other people's information. 现代意义的隐私权乃是一种个人信息控制权,因此有必要对收集、利用、保存、传播他人信息的行为全面进行规范,许多国家先后制定了个人信息保护法。
The results show that privacy and security control, and company brand and size are the two most important factors. Consumers 'characteristic and perceived ease of use have no significance influence on consumer trust. 研究发现,网站隐私保护与安全控制措施及政策、公司的规模与品牌是最重要的因素,消费者个体特征和公司网站的易用性等品质因素对信任没有显著影响。
Therefore, this paper proposed a privacy preserving access control protocol for Database as a Service. 因此,本文提出一种外包数据库服务中访问控制的隐私保护协议。
Chapter ⅶ of the standing risk management perspective presented in the new media age, citizens for privacy may be three states: Privacy Controls, privacy control, privacy proliferation. 第七章站在风险管理的视角提出要在新媒体时代,公民隐私可能处于三种状态:隐私自控、隐私监控、隐私扩散。
Then a more specific relation division model is proposed, and is applied to solve the common problems in the applications of mobile life information service, such as privacy control, information control, incentive mechanism and so on. 并且对于移动生活信息服务应用中普遍存在的如隐私控制、信息控制、激励机制等问题进行研究,并给出解决方案。
Users can use this system to make their privacy policies to manage access control of their data. 用户通过该系统制定自己的隐私策略,控制个人信息的访问权限,实现个性化的隐私保护需求。
As the progressing of the Internet technology and the growing demand for privacy protection, access control policy based on predicate has caused a large number of researcher attentions which focus on privacy protection and Internet applications. 随着Internet技术的不断进步,基于谓词的访问控制策略已经引起了从事隐私保护和Internet应用等研究人员的大量关注。
The basic elements include the right of privacy to conceal, privacy using the right to privacy and the privacy to maintain control over the right. 其基本内容包括隐私隐瞒权、隐私利用权、隐私支配权和隐私维护权等。