نتایج جستجو برای: ouafi phan privacy model
تعداد نتایج: 2140727 فیلتر نتایج به سال:
Paradigm shift towards cloud computing offers plethora of advantages both for users and Cloud Service Provider (CSP). For users, it saving cost, scaling resources, pay per use, elastic on-demand services. On the other hand, centralized resource management provisioning operations, safety security CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components software) o...
Social Media platforms have become a significant part of our daily lives and modern way to connect friends family, document lives, share other great personal information about lives. These activities leave us vulnerable privacy security breach due lapse controls necessary protect users' sensitive data on these platforms. We conducted exploratory analysis paramount social media such as Facebook ...
Cloud computing, the architecture which shares dynamic heterogeneous characteristics in the cross-layer service composition, has affected traditional security, trust and privacy mechanisms which are mainly based on data encryption and access control. Approaches that can support accurate privacy requirement description and verifiable compliance between the privacy requirement and system practice...
The huge availability of data is giving organizations the opportunity to develop and consume new data-intensive applications (e.g., predictive analytics). However, data often contain personal and confidential information, and their usage and sharing come with security and legal risks; so there is the need of devising appropriate, task specific, data release mechanisms to find the balance betwee...
Although Named Data Networking (NDN) architecture introduced security mechanisms and built the NDN basic service model, there are still privacy challenges such as consumer identity privacy, signer identity privacy, the disclosure of the ISP based on the identity privacy information, and the third party attack. Under the NDN basic service model, we analyze these privacy problems in detail and es...
Privacy concerns and a lack of trust have been shown to reduce consumer’s willingness to transact with an online vendor. Understandably, firms are searching for methods to reduce consumer privacy concerns and increase trust. In this study, we introduce a new construct – consumer privacy empowerment. We then propose and test a theoretical model that examines the relationship between consumer pri...
this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...
this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...
We study the mean field dynamics of a model introduced by Phan et al [Wehia, 2005] of a polymorphic social community. The individuals may choose between three strategies: either not to join the community or, in the case of joining it, to cooperate or to behave as a free-rider. Individuals’ preferences have an idiosyncratic component and a social component. Cooperators bear a fixed cost whereas ...
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید