Keynote - Privacy & Data Protection : Policy and Business Trends vi Harriet P . Pearson Towards Application - Oriented Data

نویسندگان

  • Kun Liu
  • Ran Wolff
  • Traian Marius Truta
  • Shipeng Yu
  • Cary Dehing-Oberije
  • Dirk De Ruysscher
  • Philippe Lambin
  • Sriram Krishnan
  • Taneli Mielikäinen
چکیده

Data anonymization is of increasing importance for allowing sharing of individual data for a variety of data analysis and mining applications. Most of existing work on data anonymization optimizes the anonymization in terms of data utility typically through one-size-fits-all measures such as data discernibility. Our primary viewpoint in this paper is that each target application may have a unique need of the data and the best way of measuring data utility is based on the analysis task for which the anonymized data will ultimately be used. We take a top-down analysis of typical application scenarios and derive applicationoriented anonymization criteria. We propose a prioritized anonymization scheme where we prioritize the attributes for anonymization based on how important and critical they are to the application needs. Finally, we present preliminary results that show the benefits of our approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy in the Electronic Society: Emerging Problems and Solutions *

As the global information infrastructure is becoming more ubiquitous, digital business transactions are increasingly performed using a variety of mobile devices and across multiple communication channels. This new service-oriented paradigm is making the protection of privacy an increasing concern, as it relies on rich context representations (e.g., of location and purpose) and requires users to...

متن کامل

Privacy Enforcement with an Extended Role-Based Access Control Model

Privacy enforcement has been one of the most important challenges in IT area. Current privacy practices within companies and organizations, e.g. enabling a P3P compliant policy, incorporating a privacy seal program, etc., cannot truly protect consumer privacy. Privacy protection can only be achieved by enforcing privacy policies within an organization’s online and offline data processing system...

متن کامل

Privacy Compliance Checking using a Model-Based Approach

In order to conduct business, organizations must try to assess and ensure compliance with privacy legislation, policies and regulations, as part of their IT governance initiatives. As well as these ‘data protection’ concerns, there may be an intangible value in proposing an ‘open’ approach to privacy compliance, for example by showing all privacy-relevant information as is done within the Googl...

متن کامل

Data Protection and the Use of Biometric Data in the EU

This article is concerned with the legal approach to the regulation of biometrics in European policy making. It is observed that the latter is based mainly on a data protection perspective. From this data protection point of view, the handling of biometric data in the EU would benefit from a more stringent application of the purpose binding principle. Further, it is demonstrated that more thoro...

متن کامل

Relationship between Spiritual Attitude and Protecting Patient Privacy in Nursing Students in Khoy

Background and Objectives: Protection of patient privacy consider as one of the fundamental requirements in professional morality, maintenance of individual dignity, and Patient-centered in the spiritual care system of nurses. This study aimed to explore the relationship between spiritual attitude and Protection of patient privacy in students at Khoy university of medical sciences in 2018. Met...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008