نتایج جستجو برای: ouafi phan privacy model
تعداد نتایج: 2140727 فیلتر نتایج به سال:
PURPOSE To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data privacy frameworks for research done with patient data. METHODS Based on an exploration of EU legal r...
In Information Processing Letters 110 (2) (2009) 57-61, Deursen and Radomirović evaluated five formal RFID privacy models. One main result is that Ha et al.’s RFID privacy model is incorrect. The supporting fact is that a constant-response protocol cannot pass the test of Ha et al.’s RFID privacy model. However, we demonstrate that the constant-response protocol is artificial, and the correspon...
Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. In 2006, Yin-Bao presented the first provably secure cross-realm C2C-PAKE, which security is proven rigorously within a formally defined security model and based on the hardness of some computationa...
Data release is likely to result in privacy disclosure, so appropriate privacy protection measures are required for various data release technologies in order to ensure the privacy and safety of information, while differential privacy as a reliable model for privacy protection is extensively researched and applied. This paper presents the histogram data publishing solutions under differential p...
In information privacy literature, limited attention was paid to the studies on the effects of a person’s privacy disposition on his/her privacy concerns. This relationship is of critical importance to privacy research, as privacy disposition is believed to be an important antecedent of privacy perceptions. In this study, a research model is developed to examine the impacts of a person’s privac...
leaving one’s parental home disrupts place attachment, described as the affective bond or link between one individual and a specific place and/or the people living in that place. in other words, because students move away from their parents, their friend and their hometown, their bonds with these people and their hometown are disrupted. although moving disrupts place attachment to their hometow...
As a new computing model, Granular computing provides a new efficient way for solving complicated problems, massive data mining, and fuzzy information processing. Privacy is becoming an increasingly important issue in many data mining applications. In this paper, we combined the existing model of granular computing with personalized privacy-preserving demand, and proposed a new granular computi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید