نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

Journal: :Perspectives in health information management 2007
Rachelle S Stewart

This study measured attitudes about patient privacy. Participants ranked a collection of 25 patient- specific health information protection measures that have been established as a part of the Health Insurance Portability and Accountability Act (HIPAA), effective in April 2003. Individual points of view were surveyed to determine which information protection measures patients felt to be least e...

Journal: :Expert Syst. Appl. 2010
Weijia Yang Sanzheng Qiao

In data mining and knowledge discovery, there are two conflicting goals: privacy protection and knowledge preservation. On the one hand, we anonymize data to protect privacy; on the other hand, we allow miners to discover useful knowledge from anonymized data. In this paper, we present an anonymization method which provides both privacy protection and knowledge preservation. Unlike most anonymi...

2004
Bradley Malin

The increasing integration of patient-specific genomic data into clinical practice and research raises serious privacy concerns. Various privacy enhancing techniques that “de-identify” the data through the removal of explicit identifiers, such as name or Social Security number, have been proposed and deployed. While advocates of these systems have the best of intentions, they are fundamentally ...

2015
Tao FENG Tao ZHOU Xian GUO Chunyan LIU

Although Named Data Networking (NDN) architecture introduced security mechanisms and built the NDN basic service model, there are still privacy challenges such as consumer identity privacy, signer identity privacy, the disclosure of the ISP based on the identity privacy information, and the third party attack. Under the NDN basic service model, we analyze these privacy problems in detail and es...

Journal: :JCM 2015
Changbo Ke Ruchuan Wang Fu Xiao Zhiqiu Huang

—As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it is difficult to control personal privacy information because of the opening, virtualization, multi-tenancy and service outsourcing characters. Therefore, how to protect user privacy information has become a research focus. In this paper, we propose requirement-oriented privacy...

2015
Siti Hajar Mohd Yasin

This paper seeks to analyse the benefits of big data and more importantly the challenges it pose to the subject of privacy and data protection. First, the nature of big data will be briefly deliberated before presenting the potential of big data in the present days. Afterwards, the issue of privacy and data protection is highlighted before discussing the challenges of implementing this issue in...

2012
Rosa Karimi Adl Mina Askari Ken Barker Reihaneh Safavi-Naini

Privacy protection appears as a fundamental concern when personal data is collected, stored, and published. Several anonymization methods have been proposed to address privacy issues in private datasets. Every anonymization method has at least one parameter to adjust the level of privacy protection considering some utility for the collected data. Choosing a desirable level of privacy protection...

2009
Ni Zhang Chris Todd

This paper concerns personal privacy and privacy protection in context-aware ubiquitous computing environments. It proposes a privacy ontology solution to facilitate automated processes in privacy control. The development of the privacy ontology is an integrated part of our ongoing effort towards a privacy-respecting middleware solution for context-aware systems.

2013
Pavel Korshunov Touradj Ebrahimi

Visual privacy protection, i.e., obfuscation of personal visual information in video surveillance is an important and increasingly popular research topic. However, while many datasets are available for testing performance of various video analytics, little to nothing exists for evaluation of visual privacy tools. Since surveillance and privacy protection have contradictory objectives, the desig...

Journal: :CoRR 2018
Subhashis Banerjee

Privacy protection in digital databases does not demand that data should not be collected, stored or used, but that there should be guarantees that the data can only be used for pre-approved and legitimate purposes. We argue that a data protection law based on traditional understanding of privacy protection and detection of privacy infringements is unlikely to be successful, and that what is re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید