نتایج جستجو برای: phan privacy model

تعداد نتایج: 2140719  

Journal: :Journal of Business Ethics 2022

Abstract An online world exists in which businesses have become burdened with managerial and legal duties regarding the seeking of informed consent protection privacy personal data, while growing public cynicism data collection threatens healthy development marketing e-commerce. This research seeks to address such by assisting organisations devise ethical management processes that consider an i...

Journal: :Security and Communication Networks 2017

Journal: :IEEE Transactions on Information Forensics and Security 2021

Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for hidden semantic discovery of text data and serves as fundamental tool analysis in various applications. However, the LDA model well training process may expose information data, thus bringing significant privacy concerns. To address issue LDA, we systematically investigate protection main-stream algorithm based on Colla...

2008
Qiang Tang Julien Bringer Hervé Chabanne David Pointcheval

With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of prac...

Journal: :I. J. Network Security 2009
Mingwu Zhang Bo Yang Shenglin Zhu Wenzheng Zhang

Distributed trust management supports the provision of the required levels in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for establishing and verifying trust metric where it may dis...

2013
Jordi Soria-Comas Josep Domingo-Ferrer

The usual approach to generate k-anonymous data sets, based on generalization of the quasi-identifier attributes, does not provide any control on the variability of the confidential attributes within the k-anonymous groups. If the latter variability is too small, privacy is not sufficiently protected, while, for large variabilities, data utility is substantially damaged. Some refinements to the...

2007
Rui Zhang Goichiro Hanaoka Hideki Imai

Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhanced authentication/signature schemes. Key privacy is considered to be an orthogonal (i.e., independent), notion from data privacy, while the key privacy of many public key encryption schemes has not been explored, though their da...

2015
Chong Huang Lalitha Sankar Anand D. Sarwate

Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید