نتایج جستجو برای: phan privacy model

تعداد نتایج: 2140719  

2014
Primal Pappachan Roberto Yus Prajit Kumar Das Timothy W. Finin Eduardo Mena Anupam Joshi

Wearable computing devices like Google Glass are at the forefront of technological evolution in smart devices. The ubiquitous and oblivious nature of photography using these devices has made people concerned about their privacy in private and public settings. The FaceBlock project protects the privacy of people around Glass users by making pictures taken by the latter, Privacy-Aware. Through sh...

2016
Cathy S. Lin

Increasingly sophisticated technologies nowadays have equipped powerful capabilities to obtain and exploit consumers’ information privacy on the Internet. The contemporary privacy protection techniques seem fail to guard information privacy. Besides of the technological protections, information ethics education is described as the ideal way to increase people’s consciousness. This study propose...

2013
Sankita Patel Viren Patel Devesh C. Jinwala

Preserving Privacy is crucial in distributed environments wherein data mining becomes a collaborative task among participants. Critical applications in distributed environment demand higher level of privacy with lesser overheads. Solutions proposed on the lines of cryptography provide higher level of privacy but poor scalability due to higher overheads. Further, existing cryptography based solu...

2016
Leon J. Osterweil Heather M. Conboy Huong Phan Borislava I. Simidchieva George S. Avrunin Lori A. Clarke Sean Peisert

Leon J. Osterweil, University of Massachusetts Amherst Matt Bishop, University of California at Davis Heather M. Conboy, University of Massachusetts Amherst Huong Phan, University of Massachusetts Amherst Borislava I. Simidchieva, University of Massachusetts Amherst and Raytheon BBN Technologies George S. Avrunin, University of Massachusetts Amherst Lori A. Clarke, University of Massachusetts A...

2015
Yue Wang Cheng Si Xintao Wu

Differential privacy preserving regression models guarantee protection against attempts to infer whether a subject was included in the training set used to derive a model. It is not designed to protect attribute privacy of a target individual when model inversion attacks are launched. In model inversion attacks, an adversary uses the released model to make predictions of sensitive attributes (u...

2011
Salah-Eddine Tbahriti Michael Mrissa Brahim Medjahed Chirine Ghedira Mahmoud Barhamgi Jocelyne Fayn

Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new privacy concerns that traditional privacy models do not handle since they only focus on the service interface without taking into account privacy constraints related to the data exchanged with a DaaS during its invocation. In addition, Da...

2006
Rafael Accorsi

We investigate a mechanism for secure remote logging to improve privacy guarantees in dynamic systems. Considering an extended threat model for privacy, we first describe outer and inner privacy: outer privacy expresses the traditional attacker model for privacy where identity management systems control the collection of personal, observable information; inner privacy denotes the threat posed b...

Journal: :Transactions on data privacy 2013
Yue Wang Xintao Wu

Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enfo...

ژورنال: حیات 2005
جولایی, سودابه , مهرداد, ندا , پارسایکتا, زهره ,

The concept of privacy, which is used in many disciplines, is a basic human need and also is recognized as an important concept in nursing. The concept of privacy has been described in various dimensions including physical, psychological, social and informational privacy. In this article we review these dimensions. Most of the studies related to the privacy have been carried out in the area of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید