نتایج جستجو برای: phan privacy model

تعداد نتایج: 2140719  

2009
Aris Gkoulalas-Divanis Vassilios S. Verykios Mohamed F. Mokbel

In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as a framework that (i) reconstructs the user movement from a series of independent location updates, (ii) identifies routes where user privacy is at risk, and (iii) anonymizes on...

2016
Lam Tran Deguang Kong Hongxia Jin Ji Liu

Photo privacy is a very important problem in the digital age where photos are commonly shared on social networking sites and mobile devices. The main challenge in photo privacy detection is how to generate discriminant features to accurately detect privacy at risk photos. Existing photo privacy detection works, which rely on low-level vision features, are non-informative to the users regarding ...

2002
Scott Lederer Anind K. Dey Jennifer Mankoff

We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent as the fair information practices of greatest e...

2016
Amanda Prorok Vijay Kumar

To date, the issues of privacy and security remain poorly addressed within robotics at large. In this work, we provide a foundation for analyzing the privacy of swarms of heterogeneous robots. Our premise is that information pertaining to individual robot types must be kept private in order to preserve the security and resilience of the swarm system at large. A main contribution is the developm...

2014
Chao Yu Yuliang Shi

With the development of cloud computing, more and more service providers deploy multitenant applications to the cloud. Multi-tenant data is stored by non-fully trusted SaaS service providers, and the protection of data privacy attracts more attention. This paper proposes a privacy protection strategy customization framework. This framework considers the privacy protection needs, SaaS applicatio...

2002
Scott Lederer Anind Dey Jennifer Mankoff Anind K. Dey

We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent as the fair information practices of greatest e...

2017
Robert E. Crossler France Bélanger

Increasing collection of individuals’ information has led to several security and privacy issues, such as identity theft and targeted marketing. These risks are further heightened in the mobile realm as data collection can occur continuously and ubiquitously. Most existing research considers threats to privacy and security as separate concerns, resulting in separate research streams. However, f...

2002
Scott Lederer Anind K. Dey Jennifer Mankoff

We present a conceptual model of everyday privacy in ubiquitous computing environments, based on the works of Lessig and Adams. By everyday privacy, we mean the enduser’s ongoing exposure to and control over personal information collection. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and con...

Journal: :JSW 2015
Abdullah Alqahtani Haiyan Lu Jie Lu

Citizens’ privacy concerns have become a major barrier to their acceptance of e-government services, and the question of how to address these privacy issues effectively is increasingly important as government pushes service delivery online. Good protection of citizens’ privacy will contribute significantly to the success of e-government services. Therefore, it is highly desirable to take into a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید