نتایج جستجو برای: similar privacy setting
تعداد نتایج: 944992 فیلتر نتایج به سال:
Encryption and signature schemes are fundamental cryptographic tools for providing privacy and authenticity, respectively, in the public-key setting. Traditionally, these two important building-blocks of public-key cryptography have been considered as distinct entities that may be composed in various ways to ensure simultaneous message privacy and authentication. However, in the last few years ...
The emerging technologies for large scale data analysis raise new challenges to the security and privacy of sensitive user data. In this work we investigate the problem of private statistical analysis of time-series data in the distributed and semi-honest setting. In particular, we study some properties of Private Stream Aggregation (PSA), first introduced by Shi et al. 2011. This is a computat...
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data x can be evaluated using a secret token corresponding to a predicate f ; the user learns whether the data satisfies the predicate, i.e., whether f(...
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract knowledge from large amounts of data. Generally, data mining requires that data be collected into a central site. However, privacy concerns may prevent different parties from sharing their data with others. Cryptograph...
Proliferation of small handheld devices and wireless technologies has kindled the phenomenon of pervasive computing. Healthcare, being a prime concern for every society, has been considered as an ideal setting for deployment of this technology. Pervasive healthcare aims to improve patient independent living and quality of life and pay special attention to issues of security, privacy, transparen...
Encrypted search — performing queries on protected data — is a well researched problem. However, existing solutions have inherent inefficiency that raises questions of practicality. Here, we step back from the goal of achieving maximal privacy guarantees in an encrypted search scenario to consider efficiency as a priority. We propose a privacy framework for search that allows tuning and optimiz...
Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, -differential privacy provides one of the strongest privacy guarantees. In this paper, we address the problem of private data publishing where data is horizontally divided among two parties over the same set of attributes. In particular, we...
Abstract. Collaborative e-Science projects commonly require data analysis to be performed on distributed data sets which may contain sensitive information. In addition to the credential-based privacy protection, ensuring proper handling of computerized data for disclosure and analysis is particularly essential in eScience. In this paper, we propose a semantic approach for enforcing it through w...
Privacy concerns are one of the most important issues in today‘s technology-based setting. Previous studies show that privacy concerns negatively influenced the individual’s behavioral intention toward a particular Web-based service or technology. However, researchers have not explored the role of privacy concerns in identity management systems (IdMS) adoption. Previous identity management stud...
In this paper an analytical framework is proposed for the evaluation of the tradeo s between location privacy and energy e ciency in wireless sensor networks. We assume that random routing is utilized to improve privacy. However, this involves an increase in the average path length and thus an increase in energy consumption. The privacy loss is measured using information theory concepts; indeed...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید