نتایج جستجو برای: similar privacy setting

تعداد نتایج: 944992  

2005
Yevgeniy Dodis

Encryption and signature schemes are fundamental cryptographic tools for providing privacy and authenticity, respectively, in the public-key setting. Traditionally, these two important building-blocks of public-key cryptography have been considered as distinct entities that may be composed in various ways to ensure simultaneous message privacy and authentication. However, in the last few years ...

2017
Filipp Valovich Francesco Aldà

The emerging technologies for large scale data analysis raise new challenges to the security and privacy of sensitive user data. In this work we investigate the problem of private statistical analysis of time-series data in the distributed and semi-honest setting. In particular, we study some properties of Private Stream Aggregation (PSA), first introduced by Shi et al. 2011. This is a computat...

Journal: :IACR Cryptology ePrint Archive 2008
Emily Shen Elaine Shi Brent Waters

Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data x can be evaluated using a secret token corresponding to a predicate f ; the user learns whether the data satisfies the predicate, i.e., whether f(...

2005
Rebecca N. Wright Zhiqiang Yang Sheng Zhong

With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract knowledge from large amounts of data. Generally, data mining requires that data be collected into a central site. However, privacy concerns may prevent different parties from sharing their data with others. Cryptograph...

2007
Sheikh I Ahamed Nilothpal Talukder Achilles D. Kameas

Proliferation of small handheld devices and wireless technologies has kindled the phenomenon of pervasive computing. Healthcare, being a prime concern for every society, has been considered as an ideal setting for deployment of this technology. Pervasive healthcare aims to improve patient independent living and quality of life and pay special attention to issues of security, privacy, transparen...

2010
Vasilis Pappas Mariana Raykova Binh Vo Steven M. Bellovin Tal Malkin

Encrypted search — performing queries on protected data — is a well researched problem. However, existing solutions have inherent inefficiency that raises questions of practicality. Here, we step back from the goal of achieving maximal privacy guarantees in an encrypted search scenario to consider efficiency as a priority. We propose a privacy framework for search that allows tuning and optimiz...

2012
Dima Alhadidi Noman Mohammed Benjamin C. M. Fung Mourad Debbabi

Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, -differential privacy provides one of the strongest privacy guarantees. In this paper, we address the problem of private data publishing where data is horizontally divided among two parties over the same set of attributes. In particular, we...

2007
William Kwok-Wai Cheung Yolanda Gil

Abstract. Collaborative e-Science projects commonly require data analysis to be performed on distributed data sets which may contain sensitive information. In addition to the credential-based privacy protection, ensuring proper handling of computerized data for disclosure and analysis is particularly essential in eScience. In this paper, we propose a semantic approach for enforcing it through w...

Journal: :JCP 2017
Ali Alkhalifah Sulaiman Al Amro

Privacy concerns are one of the most important issues in today‘s technology-based setting. Previous studies show that privacy concerns negatively influenced the individual’s behavioral intention toward a particular Web-based service or technology. However, researchers have not explored the role of privacy concerns in identity management systems (IdMS) adoption. Previous identity management stud...

2007
Sergio Armenia Giacomo Morabito Sergio Palazzo

In this paper an analytical framework is proposed for the evaluation of the tradeo s between location privacy and energy e ciency in wireless sensor networks. We assume that random routing is utilized to improve privacy. However, this involves an increase in the average path length and thus an increase in energy consumption. The privacy loss is measured using information theory concepts; indeed...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید