نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

Journal: :سیاست 0
حسین آقابابایی

liberalism as the basic ideology of the most western political orders has believed in its basic principals to fundamental human rights including the privacy and the realm that should be privileged from any one especially the public authority. however the public authorities frequently in the excuse of protection of the order and security or the necessity situation have confined the liberties and...

Journal: :CoRR 2015
Zijian Zhang Zhan Qin Liehuang Zhu Wei Jiang Chen Xu and Kui Ren

The technology of differential privacy, adding a noise drawn from the Laplace distribution, successfully overcomes a difficulty of keeping both the privacy of individual data and the utility of the statistical result simultaneously. Therefore, it is prevalent to use a rechargeable battery as the noise for achieving differential privacy in the application of smart grid. Unfortunately, to the bes...

2013
Zhanbo Sun Bin Zan Marco Gruteser

With the ubiquitous nature of mobile sensing technologies, privacy issues are becoming increasingly important, and need to be carefully addressed. Data needs for transportation modeling and privacy protection should be deliberately balanced for different applications. This paper focuses on developing privacy mechanisms that would simultaneously satisfy privacy protection and data needs for fine...

2013
Namje Park

The fact that the information can be collected not only by the government and power companies but also individual users adds seriousness to the problem. In this paper examined this issue by focusing on the load management system based on BEMS that uses the privacy policy-based protection system in the smart grid environment. The structure of the privacy policy-based protection system using load...

2008
Karsten Nohl Toby Berger Benton Calhoun Gabriel Robins

Radio Frequency Identification (RFID) technology bridges the physical and virtual worlds by enabling computers to track the movement of objects. Within a few years, RFID tags will replace barcodes on consumer items to increase the efficiency in logistics processes. The same tags, however, can be used to monitor business processes of competitors and to track individuals by the items they carry o...

2010

To the extent that there is a tension between counterterrorism efforts and protection of citizens’ privacy, it is useful to understand how it may be possible to design counterterrorism information systems to minimize their impact on privacy. This appendix considers privacy protection from two complementary perspectives—privacy protection that is built into the analytical techniques themselves a...

Journal: :PVLDB 2010
Mingxuan Yuan Lei Chen Philip S. Yu

Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background knowledge. However, in practice, different users have different privacy protect requirements. Thus, assuming the attacks with the same background knowledge does not meet the personalized privacy requirements, meanwhil...

2017
Shengna Guo Xiaofeng Meng

Density peaks clustering (DPC) is a latest and well-known density-based clustering algorithm which offers advantages for finding clusters of arbitrary shapes compared to others algorithm. However, the attacker can deduce sensitive points from the known point when the cluster centers and sizes are exactly released in the cluster analysis. To the best of our knowledge, this is the first time that...

2013
Zbigniew Kwecka William Buchanan

The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has recently gained ground in the debate on appropriate legal protection for privacy in an online environment. The jurisprudential idea that privacy is a public good and prerequisite for a functioning democracy also entails t...

2010
Yeyoung Chang

It seems that the relation of the concept of privacy and the concept of the personal information are misunderstood. The privacy comes from the personality, and it is a normative concept. On the other hand, personal information is a fact about each individual. In Japan, Privacy protection is often confused with personal data protection when talking about the Internet. But the leakage of personal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید