منابع مشابه
A Privacy-Aware Protocol for Sociometric Questionnaires
In the paper we design a protocol for sociometric questionnaires, which serves the privacy of responders. We propose a representation of a sociogram by a weighted digraph and interpret individual and collective phenomena of sociometry in terms of graph theory. We discuss security requirements for a privacy-aware protocol for sociometric questionnaires. In the scheme we use additively homomorphi...
متن کاملA Review of Childhood Abuse Questionnaires and Suggested Treatment Approaches
The focus of this chapter is on providing a review of childhood sexual abuse, physical abuse and combined abuse assessment questionnaires. Prevalence rates of childhood abuse in the United States will also be provided along with symptom and diagnostic correlates found to be associated with a childhood history of abuse. The following seven abuse screens are reviewed. (1) The Rape Aftermath Sympt...
متن کاملA Study of Whois Privacy and Proxy Service Abuse
When Internet domain names are registered for malicious purposes the registrants are unlikely to want their identity to be published in the Whois system. We show that around 90% of such registrants completely fail to provide valid contact phone numbers. However, there are significant variations, dependent upon the type of wickedness, as to whether or not privacy and proxy services are used as a...
متن کاملAWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings
System designers have long struggled with the challenge of determining how to control when untrusted applications may perform operations using privacy-sensitive sensors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors....
متن کاملPrivacy-Preserving Abuse Detection in Future Decentralised Online Social Networks
Future online social networks need to not only protect sensitive data of their users, but also protect them from abusive behavior coming from malicious participants in the network. We investigate the use of supervised learning techniques to detect abusive behavior and describe privacy-preserving protocols to compute the feature set required by abuse classification algorithms in a secure and pri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: BMJ
سال: 1977
ISSN: 0959-8138,1468-5833
DOI: 10.1136/bmj.2.6094.1086-b