نتایج جستجو برای: phan privacy model
تعداد نتایج: 2140719 فیلتر نتایج به سال:
Wearable computing devices like Google Glass are at the forefront of technological evolution in smart devices. The ubiquitous and oblivious nature of photography using these devices has made people concerned about their privacy in private and public settings. The FaceBlock project protects the privacy of people around Glass users by making pictures taken by the latter, Privacy-Aware. Through sh...
Increasingly sophisticated technologies nowadays have equipped powerful capabilities to obtain and exploit consumers’ information privacy on the Internet. The contemporary privacy protection techniques seem fail to guard information privacy. Besides of the technological protections, information ethics education is described as the ideal way to increase people’s consciousness. This study propose...
Preserving Privacy is crucial in distributed environments wherein data mining becomes a collaborative task among participants. Critical applications in distributed environment demand higher level of privacy with lesser overheads. Solutions proposed on the lines of cryptography provide higher level of privacy but poor scalability due to higher overheads. Further, existing cryptography based solu...
Leon J. Osterweil, University of Massachusetts Amherst Matt Bishop, University of California at Davis Heather M. Conboy, University of Massachusetts Amherst Huong Phan, University of Massachusetts Amherst Borislava I. Simidchieva, University of Massachusetts Amherst and Raytheon BBN Technologies George S. Avrunin, University of Massachusetts Amherst Lori A. Clarke, University of Massachusetts A...
Differential privacy preserving regression models guarantee protection against attempts to infer whether a subject was included in the training set used to derive a model. It is not designed to protect attribute privacy of a target individual when model inversion attacks are launched. In model inversion attacks, an adversary uses the released model to make predictions of sensitive attributes (u...
Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new privacy concerns that traditional privacy models do not handle since they only focus on the service interface without taking into account privacy constraints related to the data exchanged with a DaaS during its invocation. In addition, Da...
We investigate a mechanism for secure remote logging to improve privacy guarantees in dynamic systems. Considering an extended threat model for privacy, we first describe outer and inner privacy: outer privacy expresses the traditional attacker model for privacy where identity management systems control the collection of personal, observable information; inner privacy denotes the threat posed b...
Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enfo...
The concept of privacy, which is used in many disciplines, is a basic human need and also is recognized as an important concept in nursing. The concept of privacy has been described in various dimensions including physical, psychological, social and informational privacy. In this article we review these dimensions. Most of the studies related to the privacy have been carried out in the area of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید