Filters








51,119 Hits in 6.3 sec

Dare‐to‐Share : Collaborative privacy‐preserving recommendations with (almost) no crypto

Pietro Russo, Lorenzo Bracciale, Giuseppe Bianchi
2021 Security and Privacy  
Finally, as a proof-of-concept, we present an implementation of the proposed approach for our motivating use case-collaborative assessment of computer/network vulnerabilities without revealing which of  ...  K E Y W O R D S Pedersen commitment, privacy preserving recommending, risk assessment, risk management, secret sharing, verifiable secret sharing Security Privacy. 2021;4:e153. wileyonlinelibrary.com/journal  ...  etc..) but also for different types of social networks such as the Diaspora network, 33 which was a decentralized online social network with over 216 000 users.  ... 
doi:10.1002/spy2.153 fatcat:pnlnuwyg7rak3ibhqpsmou4riy

What Does it Mean for a Language Model to Preserve Privacy?

Hannah Brown, Katherine Lee, Fatemehsadat Mireshghallah, Reza Shokri, Florian Tramèr
2022 2022 ACM Conference on Fairness, Accountability, and Transparency  
of privacy as a social norm.  ...  Thus, there is a growing interest in techniques for training language models that preserve privacy.  ...  Martin Strobel for discussions about different parts of this paper.  ... 
doi:10.1145/3531146.3534642 fatcat:r6lqzkewsfaqti74l5s3sujgve

Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks

Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
2013 IEEE Transactions on Wireless Communications  
the situation of a user in a web social network.  ...  of privacy-preserving profile matching schemes for proximitybased mobile social networks.  ...  Mobile Social Networking' (MSN) refers to any or all of the sanctioning parts necessary for the contribution (posting' and uploading) and consumption (viewing/experiencing) of social media across a mobile  ... 
doi:10.1109/twc.2013.032513.120149 fatcat:oy5dio27i5bzvlh227o5paydrm

Crowdsensing and privacy in smart city applications [article]

Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R.K. Shyamasundar, Surya Nepal
2018 arXiv   pre-print
However, involving people brings of the risk of exposing their private information.This chapter explores crowdsensing in smart city applications and its privacy implications.  ...  Since the decision makers may not own all the necessary sensing infrastructures, crowdsourced sensing, can help collect important information of the city in near real-time.  ...  In disaster situation, we specifically explored the uses of delay tolerant network to create transient social network [50] .  ... 
arXiv:1806.07534v1 fatcat:2xzudp4qybdmxccseeviabnsf4

What Does it Mean for a Language Model to Preserve Privacy? [article]

Hannah Brown, Katherine Lee, Fatemehsadat Mireshghallah, Reza Shokri, Florian Tramèr
2022 arXiv   pre-print
of privacy as a social norm.  ...  Thus there is a growing interest in techniques for training language models that preserve privacy.  ...  Acknowledgments The authors would like to thank David Mimno, Nicholas Carlini, Helen Nissenbaum, Vitaly Shmatikov, Noah Fiedel, Greg Yauney, Maria Antoniak, Federica Bologna, and Martin Strobel for discussions  ... 
arXiv:2202.05520v2 fatcat:pxlryd5bgzb4jd5ifvkrklzrty

Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research

Erin E Kenneally, Kimberly Claffy
2010 IEEE Security and Privacy  
It serves three purposes: an analytical tool for assessing the risk posture of the proposed data sharing; a basis for establishing privacy management (technical and policy) controls; and a template for  ...  This window of opportunity lies in public re-examination of the assumption that the privacy risks of sharing network measurement data outweigh the benefits, and for stakeholders to self-regulate in the  ... 
doi:10.1109/msp.2010.57 fatcat:fb6saht4rvdjtjvjsdkab4knvq

Special issue on applied computational intelligence

Gwanggil Jeon, Abdellah Chehri
2021 Concurrency and Computation  
ACKNOWLEDGMENTS We would like to express our appreciation to all the authors for their informative contributions and the reviewers for their support and constructive critiques in making this special issue  ...  Walker, the Editor in Chief, for providing us with this unique opportunity to present our works in Concurrency and Computation: Practice and Experience.  ...  The emotional state revealed through facial expressions can be a useful indicator for assessing the level of immersion in learning.  ... 
doi:10.1002/cpe.6632 fatcat:z3juvtoi2zbs7jmhacte2l2rn4

A Survey on Interdependent Privacy

Mathias Humbert, Benjamin Trubert, Kévin Huguenin
2019 ACM Computing Surveys  
The privacy of individuals does not only depend on their own actions and data but may also be affected by the privacy decisions and by the data shared by other individuals.  ...  In this survey, we summarize and analyze research on interdependent privacy risks and on the associated (cooperative and non-cooperative) solutions.  ...  The authors also warmly thank Holly Cogliati for her great editing job on the manuscript. This work was partially funded by the Swiss National Science Foundation with Grant #200021_178978.  ... 
doi:10.1145/3360498 fatcat:xu2jtvhv7vhcrpo6agsrr2tf6u

Planning a Stigmatized Nonvisible Illness Disclosure: Applying the Disclosure Decision-Making Model

Soe Yoon Choi, Maria K. Venetis, Kathryn Greene, Kate Magsamen-Conrad, Maria G. Checton, Smita C. Banerjee
2016 Journal of Psychology  
Implications of understanding stages of planning for stigmatized information are discussed.  ...  The rest of the hypothesized relationships showed a similar pattern to Study 1: disclosure efficacy reduced planning, which then positively influenced scheduling.  ...  The content is solely the responsibility of the authors and does not necessarily represent the official views of the NIH.  ... 
doi:10.1080/00223980.2016.1226742 pmid:27662447 pmcid:PMC5215027 fatcat:vgvggx5hpffrpbubdwszqqkeem

Prevention Mechanism of Information Deceit

Rana Majumdar, Abhishek Singhal, Abhay Bansal
2012 International Journal of Computer Applications  
various techniques related to social engineering attack; the countermeasures for a social engineering attack.  ...  Data security and extracting intelligence from data in the form of information is the area where every organization is concerned about it.  ...  when the prediction wasn't shared in advance of the outcome.  ... 
doi:10.5120/7608-0651 fatcat:v4cxqffxkzfyfmzmdmyhwutuuq

Privacy Preserving Reputation Management in Social Networks [chapter]

Omar Hasan, Lionel Brunie
2013 Lecture Notes in Social Networks  
However, a major challenge in developing reputation systems for social networks is that users often hesitate to publicly rate fellow users or friends due to the fear of retaliation.  ...  Reputation systems can also play an important role in social networks to enforce various security requirements. For example, a reputation system can help filter fake user profiles.  ...  Social Networks A social network is a composition of nodes and the relationships between them. The nodes in a social network may be individuals or collectives of individuals.  ... 
doi:10.1007/978-3-7091-0894-9_8 dblp:series/lnsn/HasanB13 fatcat:dyeswkwtmvfurgsefr7y64lgga

A Comprehensive Security Model for Networking Applications

Eric Chan-Tin, Tingting Chen, Subhash Kak
2012 2012 21st International Conference on Computer Communications and Networks (ICCCN)  
The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks  ...  We propose a comprehensive security model for networking applications that includes new key distribution and management techniques and a realistic trust model.  ...  The new techniques consider a general model of risk distribution that is appropriate for situations related to a wide variety of applications.  ... 
doi:10.1109/icccn.2012.6289238 dblp:conf/icccn/Chan-TinCK12 fatcat:upmrbe3bebaahhjb6crhkjoz7i

A Conceptual Formative Framework of Knowledge Risk Governance to Enhance Knowledge Sharing

Azadeh Sarkheyli, Rose Alinda Alias, Norafida Binti Ithni
2014 Pacific Asia Conference on Information Systems  
The issue of security has been a controversial and much disputed subject within the field of Knowledge Sharing (KS).  ...  Thus, this study proposes a conceptual framework of Knowledge Risk Governance (KRG) to illustrate how governance of KS risks can be applied to decrease the risks of KS.  ...  FUTURE RESEARCH The results of this research exposed a number of opportunities for managers in organizations that influence the success of implementing KS as a whole.  ... 
dblp:conf/pacis/SarkheyliAI14 fatcat:old7sgpaxndmfatp2gkr2dsleq

Online social networks: why we disclose

Hanna Krasnova, Sarah Spiekermann, Ksenia Koroleva, Thomas Hildebrand
2010 Journal of Information Technology  
However, users' perception of risk can be mitigated by their trust in the Network Provider and availability of control options. Based on these findings, we offer recommendations for Network Providers.  ...  On Online Social Networks such as Facebook, massive self-disclosure by users has attracted the attention of industry players and policymakers worldwide.  ...  associated with the public accessibility of users' information: secret sharing, collection and sharing of information by third parties, identity theft or use of the information for phishing (Hogben, 2007  ... 
doi:10.1057/jit.2010.6 fatcat:fpbjf5n55fe27kaqhiem5t4nhm

Factors Associated with HIV Risk and Vulnerability Among Injecting Drug Users in Afghanistan: A Narrative Review

Ahmad Shekaib Rasikh
2022 HIV/AIDS : Research and Palliative Care  
The modified social ecological model was used as conceptual framework for analysis of the HIV risk and vulnerability factors among IDUs at five levels.  ...  At the "stage of epidemic level", the concentrated HIV epidemic among IDUs in the country poses a potential risk to uninfected IDUs and beyond.  ...  for the master studies of the author in international health.  ... 
doi:10.2147/hiv.s366970 pmid:35911789 pmcid:PMC9329675 fatcat:q6rfecuwsnfyhafo6y4w2v3fzi
« Previous Showing results 1 — 15 out of 51,119 results