نتایج جستجو برای: ouafi phan privacy model

تعداد نتایج: 2140727  

Journal: :Advances in parallel computing 2021

Paradigm shift towards cloud computing offers plethora of advantages both for users and Cloud Service Provider (CSP). For users, it saving cost, scaling resources, pay per use, elastic on-demand services. On the other hand, centralized resource management provisioning operations, safety security CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components software) o...

Journal: :Proceedings of the ... international conference on information warfare and security 2022

Social Media platforms have become a significant part of our daily lives and modern way to connect friends family, document lives, share other great personal information about lives. These activities leave us vulnerable privacy security breach due lapse controls necessary protect users' sensitive data on these platforms. We conducted exploratory analysis paramount social media such as Facebook ...

2015
Jin Wang

Cloud computing, the architecture which shares dynamic heterogeneous characteristics in the cross-layer service composition, has affected traditional security, trust and privacy mechanisms which are mainly based on data encryption and access control. Approaches that can support accurate privacy requirement description and verifiable compliance between the privacy requirement and system practice...

2016
Nadia Metoui Michele Bezzi

The huge availability of data is giving organizations the opportunity to develop and consume new data-intensive applications (e.g., predictive analytics). However, data often contain personal and confidential information, and their usage and sharing come with security and legal risks; so there is the need of devising appropriate, task specific, data release mechanisms to find the balance betwee...

2015
Tao FENG Tao ZHOU Xian GUO Chunyan LIU

Although Named Data Networking (NDN) architecture introduced security mechanisms and built the NDN basic service model, there are still privacy challenges such as consumer identity privacy, signer identity privacy, the disclosure of the ISP based on the identity privacy information, and the third party attack. Under the NDN basic service model, we analyze these privacy problems in detail and es...

Journal: :Electronic Markets 2007
Thomas P. Van Dyke Vishal Midha Hamid R. Nemati

Privacy concerns and a lack of trust have been shown to reduce consumer’s willingness to transact with an online vendor. Understandably, firms are searching for methods to reduce consumer privacy concerns and increase trust. In this study, we introduce a new construct – consumer privacy empowerment. We then propose and test a theoretical model that examines the relationship between consumer pri...

Journal: :international journal of architecture and urban development 0
fatemeh mohammad niay gharaei ph.d. candidate, department of art and architecture, science and research branch, islamic azad university, tehran, iran.

this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...

Journal: :international journal of architecture and urban development 2013
fatemeh mohammad niay gharaei

this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...

2008
Yiping Ma

We study the mean field dynamics of a model introduced by Phan et al [Wehia, 2005] of a polymorphic social community. The individuals may choose between three strategies: either not to join the community or, in the case of joining it, to cooperate or to behave as a free-rider. Individuals’ preferences have an idiosyncratic component and a social component. Cooperators bear a fixed cost whereas ...

Hasan Alizadeh Narges Naderi

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید