نتایج جستجو برای: ouafi phan privacy model

تعداد نتایج: 2140727  

Journal: :JASIST 2012
Paul Benjamin Lowry Gregory Moody Anthony Vance Matthew L. Jensen Jeffrey L. Jenkins Taylor Wells

Privacy concerns can greatly hinder consumers’ intentions to interact with a website. The success of a website therefore depends on its ability to improve consumers’ perceptions of privacy assurance. Seals and assurance statements are mechanisms often used to increase this assurance; however, the findings of the extant literature regarding the effectiveness of these tools are mixed. We propose ...

Journal: :CoRR 2017
Emre Yilmaz Hakan Ferhatosmanoglu Erman Ayday Remzi Can Aksoy

Today, vast amounts of location data are collected by various service providers. The location data owners have a good idea of where their customers are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. However, location data owners cannot directly share their data with other businesses, mainly due ...

2009
Elli Androulaki Steven M. Bellovin

Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website know the company selling the product, as well as the name and address of the online customer. To make matters worse, if the same delivery company has contracted with many websites, aggregated information per address may b...

2011
Jannik Dreier Pascal Lafourcade Yassine Lakhnech

Recently an attack on ballot privacy in Helios has been discovered [20], which is essentially based on copying other voter’s votes. To capture this and similar attacks, we extend the classical threat model and introduce a new security notion for voting protocols: Vote-Independence. We give a formal definition and analyze its relationship to established privacy properties such as Vote-Privacy, R...

2009
Jiawei Han Philip Yu Rajeev Motwani

Title of Dissertation: Privacy Preserving Distributed Data Mining based on Multi-objective Optimization and Algorithmic Game Theory Kamalika Das, Doctor of Philosophy, 2009 Thesis directed by: Dr. Hillol Kargupta Professor Department of Computer Science and Electrical Engineering Use of technology for data collection and analysis has seen an unprecedented growth in the last couple of decades. I...

2017
Andrew Simpson Majed Alshammari

It is well understood that processing personal data without effective data management models may lead to privacy violations. Such concerns have motivated the development of privacy-preserving systems and legal frameworks such as the EU General Data Protection Regulation. However, there is a disconnect between policy-makers and engineers with respect to the meaning of privacy. In addition, it is...

2002
Günter Karjoth Matthias Schunter Michael Waidner

The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in four building blocks. The privacy regulation analysis identifies and structures the applicable regulations. The management reference model enables an enterprise to define and enforce an enterprise privacy strategy and th...

Journal: :JSW 2012
Yun Pan Xiao-ling Zhu Ting-gui Chen

The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...

Journal: :APJOR 2006
Anisur Rahman Gopinath Chattopadhyay

A large number of products are now being sold with long-term warranty policies. This is mainly due to fierce competition in the market and customer demand. Offering long term warranty results in additional complexities in estimating costs associated with warranty servicing due to the uncertainties associated with usage, preventive maintenance and warranty servicing strategies. This paper review...

Journal: :International Journal of Security and Its Applications 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید