2011 4th IFIP International Conference on New Technologies, Mobility and Security 2011
DOI: 10.1109/ntms.2011.5721053
|View full text |Cite
|
Sign up to set email alerts
|

Anonymization in Intelligent Surveillance Systems

Abstract: Modern surveillance systems collect a massive amount of data. In contrast to conventional systems that store raw sensor material, modern systems take advantage of smart sensors and improvements in image processing. They extract relevant information about the observed objects of interest, which is then stored and processed during the surveillance process. Such high-level information is, e.g., used for situation analysis and can be processed in different surveillance tasks. Modern systems have become powerful, c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…The PM uses dierent kinds of anonymization modules. A typical job would be to anonymize position data to reach certain k-Anonymity or l-Diversity values [14].…”
Section: Privacy Managermentioning
confidence: 99%
See 1 more Smart Citation
“…The PM uses dierent kinds of anonymization modules. A typical job would be to anonymize position data to reach certain k-Anonymity or l-Diversity values [14].…”
Section: Privacy Managermentioning
confidence: 99%
“…3. If the privacy policies include obligations for further anonymization of the data the Privacy Manager applies its corresponding anonymization module [14].…”
Section: User Level Service Communicationmentioning
confidence: 99%
“…Secondly, abstract and central storage of information of a PE allow the controlled use of Privacy Enhancing Technology (PET). E. g., similar to surveillance [22], position data can be anonymized according to k-anonymity [16] and l-diversity [11].…”
Section: Oowm Framework For Privacy Enforcementmentioning
confidence: 99%
“…It is used, to decide, which policy is applicable, when the system processes a request. Inside the Target, the elements Subject (line [3][4][5][6][7][8][9][10]), Resource (line [11][12][13][14][15][16][17][18][19][20][21][22]) and Action (line [23][24][25][26][27][28][29][30]) are specified. The Subject is the person, software or object that is requesting information from the system.…”
Section: Requirementmentioning
confidence: 99%