نتایج جستجو برای: phan privacy model

تعداد نتایج: 2140719  

2015
Jin Wang

Cloud computing, the architecture which shares dynamic heterogeneous characteristics in the cross-layer service composition, has affected traditional security, trust and privacy mechanisms which are mainly based on data encryption and access control. Approaches that can support accurate privacy requirement description and verifiable compliance between the privacy requirement and system practice...

2016
Nadia Metoui Michele Bezzi

The huge availability of data is giving organizations the opportunity to develop and consume new data-intensive applications (e.g., predictive analytics). However, data often contain personal and confidential information, and their usage and sharing come with security and legal risks; so there is the need of devising appropriate, task specific, data release mechanisms to find the balance betwee...

2015
Tao FENG Tao ZHOU Xian GUO Chunyan LIU

Although Named Data Networking (NDN) architecture introduced security mechanisms and built the NDN basic service model, there are still privacy challenges such as consumer identity privacy, signer identity privacy, the disclosure of the ISP based on the identity privacy information, and the third party attack. Under the NDN basic service model, we analyze these privacy problems in detail and es...

Journal: :Electronic Markets 2007
Thomas P. Van Dyke Vishal Midha Hamid R. Nemati

Privacy concerns and a lack of trust have been shown to reduce consumer’s willingness to transact with an online vendor. Understandably, firms are searching for methods to reduce consumer privacy concerns and increase trust. In this study, we introduce a new construct – consumer privacy empowerment. We then propose and test a theoretical model that examines the relationship between consumer pri...

Journal: :international journal of architecture and urban development 0
fatemeh mohammad niay gharaei ph.d. candidate, department of art and architecture, science and research branch, islamic azad university, tehran, iran.

this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...

Journal: :international journal of architecture and urban development 2013
fatemeh mohammad niay gharaei

this study investigated cross-cultural differences in the privacy regulation and perception of crowding amongtwo iranian sub-cultures (kurdish and northern women).the primary purpose of this study was to examine whether northern and kurdish women differed in their desired and achieved levels of privacy in parks. the second purpose of this study was to investigate the relationships between the d...

2008
Yiping Ma

We study the mean field dynamics of a model introduced by Phan et al [Wehia, 2005] of a polymorphic social community. The individuals may choose between three strategies: either not to join the community or, in the case of joining it, to cooperate or to behave as a free-rider. Individuals’ preferences have an idiosyncratic component and a social component. Cooperators bear a fixed cost whereas ...

Hasan Alizadeh Narges Naderi

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

2007
Rieuwert J. Blok Corneliu Hoffman

We obtain the symplectic group Sp(V ) as the universal completion of an amalgam of low rank subgroups akin to Levi components. We let Sp(V ) act flag-transitively on the geometry of maximal rank subspaces of V . We show that this geometry and its rank ≥ 3 residues are simply connected with few exceptions. The main exceptional residue is described in some detail. The amalgamation result is then ...

Journal: :International Journal of Computer and Communication Technology 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید