A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Dare‐to‐Share : Collaborative privacy‐preserving recommendations with (almost) no crypto
2021
Security and Privacy
Finally, as a proof-of-concept, we present an implementation of the proposed approach for our motivating use case-collaborative assessment of computer/network vulnerabilities without revealing which of ...
K E Y W O R D S Pedersen commitment, privacy preserving recommending, risk assessment, risk management, secret sharing, verifiable secret sharing Security Privacy. 2021;4:e153. wileyonlinelibrary.com/journal ...
etc..) but also for different types of social networks such as the Diaspora network, 33 which was a decentralized online social network with over 216 000 users. ...
doi:10.1002/spy2.153
fatcat:pnlnuwyg7rak3ibhqpsmou4riy
What Does it Mean for a Language Model to Preserve Privacy?
2022
2022 ACM Conference on Fairness, Accountability, and Transparency
of privacy as a social norm. ...
Thus, there is a growing interest in techniques for training language models that preserve privacy. ...
Martin Strobel for discussions about different parts of this paper. ...
doi:10.1145/3531146.3534642
fatcat:r6lqzkewsfaqti74l5s3sujgve
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks
2013
IEEE Transactions on Wireless Communications
the situation of a user in a web social network. ...
of privacy-preserving profile matching schemes for proximitybased mobile social networks. ...
Mobile Social Networking' (MSN) refers to any or all of the sanctioning parts necessary for the contribution (posting' and uploading) and consumption (viewing/experiencing) of social media across a mobile ...
doi:10.1109/twc.2013.032513.120149
fatcat:oy5dio27i5bzvlh227o5paydrm
Crowdsensing and privacy in smart city applications
[article]
2018
arXiv
pre-print
However, involving people brings of the risk of exposing their private information.This chapter explores crowdsensing in smart city applications and its privacy implications. ...
Since the decision makers may not own all the necessary sensing infrastructures, crowdsourced sensing, can help collect important information of the city in near real-time. ...
In disaster situation, we specifically explored the uses of delay tolerant network to create transient social network [50] . ...
arXiv:1806.07534v1
fatcat:2xzudp4qybdmxccseeviabnsf4
What Does it Mean for a Language Model to Preserve Privacy?
[article]
2022
arXiv
pre-print
of privacy as a social norm. ...
Thus there is a growing interest in techniques for training language models that preserve privacy. ...
Acknowledgments The authors would like to thank David Mimno, Nicholas Carlini, Helen Nissenbaum, Vitaly Shmatikov, Noah Fiedel, Greg Yauney, Maria Antoniak, Federica Bologna, and Martin Strobel for discussions ...
arXiv:2202.05520v2
fatcat:pxlryd5bgzb4jd5ifvkrklzrty
Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research
2010
IEEE Security and Privacy
It serves three purposes: an analytical tool for assessing the risk posture of the proposed data sharing; a basis for establishing privacy management (technical and policy) controls; and a template for ...
This window of opportunity lies in public re-examination of the assumption that the privacy risks of sharing network measurement data outweigh the benefits, and for stakeholders to self-regulate in the ...
doi:10.1109/msp.2010.57
fatcat:fb6saht4rvdjtjvjsdkab4knvq
Special issue on applied computational intelligence
2021
Concurrency and Computation
ACKNOWLEDGMENTS We would like to express our appreciation to all the authors for their informative contributions and the reviewers for their support and constructive critiques in making this special issue ...
Walker, the Editor in Chief, for providing us with this unique opportunity to present our works in Concurrency and Computation: Practice and Experience. ...
The emotional state revealed through facial expressions can be a useful indicator for assessing the level of immersion in learning. ...
doi:10.1002/cpe.6632
fatcat:z3juvtoi2zbs7jmhacte2l2rn4
A Survey on Interdependent Privacy
2019
ACM Computing Surveys
The privacy of individuals does not only depend on their own actions and data but may also be affected by the privacy decisions and by the data shared by other individuals. ...
In this survey, we summarize and analyze research on interdependent privacy risks and on the associated (cooperative and non-cooperative) solutions. ...
The authors also warmly thank Holly Cogliati for her great editing job on the manuscript. This work was partially funded by the Swiss National Science Foundation with Grant #200021_178978. ...
doi:10.1145/3360498
fatcat:xu2jtvhv7vhcrpo6agsrr2tf6u
Planning a Stigmatized Nonvisible Illness Disclosure: Applying the Disclosure Decision-Making Model
2016
Journal of Psychology
Implications of understanding stages of planning for stigmatized information are discussed. ...
The rest of the hypothesized relationships showed a similar pattern to Study 1: disclosure efficacy reduced planning, which then positively influenced scheduling. ...
The content is solely the responsibility of the authors and does not necessarily represent the official views of the NIH. ...
doi:10.1080/00223980.2016.1226742
pmid:27662447
pmcid:PMC5215027
fatcat:vgvggx5hpffrpbubdwszqqkeem
Prevention Mechanism of Information Deceit
2012
International Journal of Computer Applications
various techniques related to social engineering attack; the countermeasures for a social engineering attack. ...
Data security and extracting intelligence from data in the form of information is the area where every organization is concerned about it. ...
when the prediction wasn't shared in advance of the outcome. ...
doi:10.5120/7608-0651
fatcat:v4cxqffxkzfyfmzmdmyhwutuuq
Privacy Preserving Reputation Management in Social Networks
[chapter]
2013
Lecture Notes in Social Networks
However, a major challenge in developing reputation systems for social networks is that users often hesitate to publicly rate fellow users or friends due to the fear of retaliation. ...
Reputation systems can also play an important role in social networks to enforce various security requirements. For example, a reputation system can help filter fake user profiles. ...
Social Networks A social network is a composition of nodes and the relationships between them. The nodes in a social network may be individuals or collectives of individuals. ...
doi:10.1007/978-3-7091-0894-9_8
dblp:series/lnsn/HasanB13
fatcat:dyeswkwtmvfurgsefr7y64lgga
A Comprehensive Security Model for Networking Applications
2012
2012 21st International Conference on Computer Communications and Networks (ICCCN)
The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks ...
We propose a comprehensive security model for networking applications that includes new key distribution and management techniques and a realistic trust model. ...
The new techniques consider a general model of risk distribution that is appropriate for situations related to a wide variety of applications. ...
doi:10.1109/icccn.2012.6289238
dblp:conf/icccn/Chan-TinCK12
fatcat:upmrbe3bebaahhjb6crhkjoz7i
A Conceptual Formative Framework of Knowledge Risk Governance to Enhance Knowledge Sharing
2014
Pacific Asia Conference on Information Systems
The issue of security has been a controversial and much disputed subject within the field of Knowledge Sharing (KS). ...
Thus, this study proposes a conceptual framework of Knowledge Risk Governance (KRG) to illustrate how governance of KS risks can be applied to decrease the risks of KS. ...
FUTURE RESEARCH The results of this research exposed a number of opportunities for managers in organizations that influence the success of implementing KS as a whole. ...
dblp:conf/pacis/SarkheyliAI14
fatcat:old7sgpaxndmfatp2gkr2dsleq
Online social networks: why we disclose
2010
Journal of Information Technology
However, users' perception of risk can be mitigated by their trust in the Network Provider and availability of control options. Based on these findings, we offer recommendations for Network Providers. ...
On Online Social Networks such as Facebook, massive self-disclosure by users has attracted the attention of industry players and policymakers worldwide. ...
associated with the public accessibility of users' information: secret sharing, collection and sharing of information by third parties, identity theft or use of the information for phishing (Hogben, 2007 ...
doi:10.1057/jit.2010.6
fatcat:fpbjf5n55fe27kaqhiem5t4nhm
Factors Associated with HIV Risk and Vulnerability Among Injecting Drug Users in Afghanistan: A Narrative Review
2022
HIV/AIDS : Research and Palliative Care
The modified social ecological model was used as conceptual framework for analysis of the HIV risk and vulnerability factors among IDUs at five levels. ...
At the "stage of epidemic level", the concentrated HIV epidemic among IDUs in the country poses a potential risk to uninfected IDUs and beyond. ...
for the master studies of the author in international health. ...
doi:10.2147/hiv.s366970
pmid:35911789
pmcid:PMC9329675
fatcat:q6rfecuwsnfyhafo6y4w2v3fzi
« Previous
Showing results 1 — 15 out of 51,119 results