نتایج جستجو برای: similar privacy setting

تعداد نتایج: 944992  

2014
Yiling Chen Or Sheffet Salil P. Vadhan

The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizing agents has received much attention lately. Privacy concerns are often modeled by altering the utility functions of agents to consider also their privacy loss [24,13,19,4]. Such privacy aware agents prefer to take a randomized strategy even in very simple games in which non-privacy aware agents ...

2017
Rachel Cummings Sara Krehbiel Kevin A. Lai Uthaipon Tantipongpipat

Differential privacy [DMNS06] is a strong definition of database privacy that provides individuals in a database with the guarantee that any particular person’s information has very little effect on the output of any analysis of the overall database. In order for this type of analysis to be practical, it must simultaneously preserve privacy and utility, where utility refers to how well the anal...

2003
Lin Liu Eric S. K. Yu John Mylopoulos

Security issues for software systems ultimately concern relationships among social actors stakeholders, system users, potential attackers and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent-oriented requirements modeling language. The framework supports a set of analysis techniques. In p...

2013
Xin Ruan Chuan Yue Haining Wang

Users of online social networks (OSNs) share personal information with their peers. To manage the access to one’s personal information, each user is enabled to configure its privacy settings. However, even though users are able to customize the privacy of their homepages, their private information could still be compromised by an attacker by exploiting their own and their friends’ public profil...

Journal: :IEEE Access 2021

With the ever-increasing popularity of sports and health ideas, people are paying more attentions to gaining high-quality healthy life through various taking sport items or exercises. Through observing analyzing past exercise score records, we can cluster players into different categories, each which share same similar preferences performances. However, records often massive stored in cloud pla...

2011
Adam Groce Jonathan Katz Arkady Yerukhimovich

Differential privacy is a well established definition guaranteeing that queries to a database do not reveal “too much” information about specific individuals who have contributed to the database. The standard definition of differential privacy is information theoretic in nature, but it is natural to consider computational relaxations and to explore what can be achieved with respect to such noti...

Journal: :معماری و شهرسازی 0
علی اکبر جیدری عضو هیئت علمی دانشکده فنی دانشگاه یاسوج زهرا عبدی پور دانشجوی کارشناسی ارشد دانشگاه آزاد اسلامی واحد شیراز

leaving one’s parental home disrupts place attachment, described as the affective bond or link between one individual and a specific place and/or the people living in that place. in other words, because students move away from their parents, their friend and their hometown, their bonds with these people and their hometown are disrupted. although moving disrupts place attachment to their hometow...

2010
Pieter Verhaeghe Kristof Verslype Jorn Lapon Vincent Naessens Bart De Decker

This paper illustrates and scans the limits of the use of anonymous credentials (e.g. Idemix) on smart phones to preserve the user’s privacy. A prototypical application with strong privacy requirements, ePoll, will be presented in detail. To ease the implementation of such applications, a specialized identity management framework has been developed. A first prototype of the ePoll application wa...

2016
Stephen T. Wu Tamara Timmons Amy Yates Meikun Wang Steven Bedrick William R. Hersh Hongfang Liu

Privacy concerns have often served as an insurmountable barrier for the production of research and resources in clinical information retrieval (IR). We believe that both clinical IR research innovation and legitimate privacy concerns can be served by the creation of intra-institutional, fully protected resources. In this paper, we provide some principles and tools for IR resource-building in th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید