1,293 Hits in 3.5 sec

A rigorous and customizable framework for privacy

Daniel Kifer, Ashwin Machanavajjhala
2012 Proceedings of the 31st symposium on Principles of Database Systems - PODS '12  
In this paper we introduce a new and general privacy framework called Pufferfish.  ...  rigorously account for prior data releases.  ...  CONCLUSIONS We presented the Pufferfish framework, a new and general framework that allows application domain experts to develop rigorous privacy definitions for their data sharing needs.  ... 
doi:10.1145/2213556.2213571 dblp:conf/pods/KiferM12 fatcat:jzta3wnia5brvaw65b7o7wgwb4

PGLP: Customizable and Rigorous Location Privacy through Policy Graph [article]

Yang Cao, Yonghui Xiao, Shun Takagi, Li Xiong, Masatoshi Yoshikawa, Yilin Shen, Jinfei Liu, Hongxia Jin, Xiaofeng Xu
2020 arXiv   pre-print
Third, we design a private location trace release framework that pipelines the detection of location exposure, policy graph repair, and private trajectory release with customizable and rigorous location  ...  To address this issue, we propose a new location privacy notion called PGLP, i.e., Policy Graph based Location Privacy, providing a rich interface to release private locations with customizable and rigorous  ...  First, there is a lack of a rigorous and customizable location privacy metric and mechanisms.  ... 
arXiv:2005.01263v2 fatcat:pp33f3zpurhallginqprtkir2y

dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation [article]

Sofiane Mahiou, Kai Xu, Georgi Ganev
2022 arXiv   pre-print
We propose a general, flexible, and scalable framework dpart, an open source Python library for differentially private synthetic data generation.  ...  The library has been created with a view to serve as a quick and accessible baseline as well as to accommodate a wide audience of users, from those making their first steps in synthetic data generation  ...  Privacy-preserving synthetic data, relying on rigorous privacy definitions such as Differential Privacy (DP) and machine learning generative models, is a promising solution as it could serve a drop-in  ... 
arXiv:2207.05810v1 fatcat:rmck2gukbbd6bamjltd5vgcqhe

DPHMM: Customizable Data Release with Differential Privacy via Hidden Markov Model [article]

Yonghui Xiao, Yilin Shen, Jinfei Liu, Li Xiong, Hongxia Jin, Xiaofeng Xu
2016 arXiv   pre-print
Specifically, we treat every state in Markov model as a node, and use a graph to represent the privacy policy, in which "indistinguishability" between states is denoted by edges between nodes.  ...  We also implement and evaluate the DPHMM on real-world datasets, showing that privacy and utility can be better tuned with customized policy graph.  ...  Contributions First, we propose a rigorous and customizable DPHMM notion by extending the Blowfish privacy [16] .  ... 
arXiv:1609.09172v1 fatcat:kbbfj4hhn5ccngfymmdepvniv4

A privacy framework

Jinfei Liu, Li Xiong, Jun Luo
2013 Proceedings of the Joint EDBT/ICDT 2013 Workshops on - EDBT '13  
In this paper we illustrate a privacy framework named Indistinguishable 1 Privacy.  ...  To the best of our knowledge, this is the first work that illustrates the relationships of these privacy definitions and unifies them through one framework. number of participants wish to compute a public  ...  The authors would also like to thank the anonymous reviewers for their valuable comments that helped improve the final version of the paper.  ... 
doi:10.1145/2457317.2457340 dblp:conf/edbt/LiuXL13 fatcat:ah33u74vz5f2xa7nwk2f7rwvsq

Internet of Things Buttons for Real-Time Notifications in Hospital Operations: Proposal for Hospital Implementation

Peter Ray Chai, Haipeng Zhang, Christopher W Baugh, Guruprasad D Jambaulikar, Jonathan C McCabe, Janet M Gorman, Edward W Boyer, Adam Landman
2018 Journal of Medical Internet Research  
Methods: In order to meaningfully deploy Internet of Things buttons in a hospital system, we propose an implementation framework grounded in the Plan-Do-Study-Act method.  ...  Customizable Internet of Things buttons are small, wirelessly-enabled devices that trigger specific actions with the press of an integrated button and have the potential to automate some of these repetitive  ...  We thank Visbyl (Germantown, MD) for providing IoT button hardware, software, and support for us to pilot at Brigham and Women's Hospital.  ... 
doi:10.2196/jmir.9454 pmid:30097420 fatcat:wmula2vspjfxpbkxlbamysqhwq

A Hybrid Approach to Privacy-Preserving Federated Learning [article]

Stacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke, Heiko Ludwig, Rui Zhang, Yi Zhou
2019 arXiv   pre-print
Our system is therefore a scalable approach that protects against inference threats and produces models with high accuracy.  ...  In this paper, we present an alternative approach that utilizes both differential privacy and SMC to balance these trade-offs.  ...  Preliminaries Differential Privacy Differential privacy (DP) is a rigorous mathematical framework wherein an algorithm may be described as differentially private if and only if the inclusion of a single  ... 
arXiv:1812.03224v2 fatcat:gwpduqbn4vgsdgcvsc22ip2twe

Technology Evaluation and Assessment Criteria for Health apps (TEACH-apps) (Preprint)

Erica Camacho, Sarah Lagan, Elena Rodriguez-Villa, Natali Rauseo-Ricupero, Hannah Wisniewski, Liza Hoffman, Philip Henson, John Torous
2020 Journal of Medical Internet Research  
The need for such a process to assist in the implementation of app evaluation across all medical fields is evident.  ...  Tailoring a well-known implementation framework, Replicating Effective Programs, we present a new process to approach the challenges faced in implementing app evaluation tools today.  ...  In this paper, we offer a series of customizable resources in the form of handouts and worksheets that can be found in Appendix 1.  ... 
doi:10.2196/18346 pmid:32535548 fatcat:kymr7r5jonbw7ffzlmxg5te3em

Guest editorial: Special issue on big data networking

Xiaofei Liao, Song Guo, Deze Zeng, Kun Wang
2018 Peer-to-Peer Networking and Applications  
Following an open call for papers, we received 41 submissions and eventually get 12 articles accepted after rigorous peer-review process, with an overall acceptance ratio 29.2%.  ...  The , they propose a new framework to coordinate the GPUs on a common training task, showing great speed-up ratio comparing to data parallelism models.  ... 
doi:10.1007/s12083-018-0634-4 fatcat:t6pkczw635gnvcw2a7hkfb5wga

Differentially Private Real-Time Data Publishing over Infinite Trajectory Streams

Yang CAO, Masatoshi YOSHIKAWA
2016 IEICE transactions on information and systems  
-Differential Privacy has emerged as a well-known standard for private statistics publishing because of its guarantee of being rigorous and mathematically provable.  ...  To this end, we propose a flexible privacy model of -trajectory privacy to ensure every desired length of trajectory under protection of -differential privacy.  ...  Therefore, a rigorous privacy model is necessary.  ... 
doi:10.1587/transinf.2015edp7096 fatcat:s2hc54vqjrfnzcognd2riyhyoa

Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals

Xiuqing Chen, Hong Zhu, Deqin Geng, Wei Liu, Rui Yang, Shoudao Li
2020 Journal of Healthcare Engineering  
We focus on hybrid systems developed for patient physiological signals for collection, storage protection, and monitoring in critical care and clinical practice.  ...  In order to provide medical data privacy protection and medical decision support, the hybrid systems are presented, and RFID, blockchain, and big data technologies are used to analyse physiological signals  ...  [19] proposed a security and privacy protection solution for fog computing, which designs a framework for security and privacy protection using fog computing and a privacy leakage based on contextbased  ... 
doi:10.1155/2020/2452683 pmid:32351676 pmcid:PMC7178520 fatcat:bhnxlumxtvdfllad3pchu4qzf4


M. Santana Quintero, S. Fai, L. Smith, A. Duer, L. Barazzetti
2019 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
This contribution seeks to establish a framework to review and apply ethical concepts to improve the field of digital heritage recording.</p>  ...  Rigorous documentation may also serve a broader purpose: over time, it becomes the primary means by which scholars and the public apprehend a site that has since changed radically or disappeared.  ...  ACKNOWLEDGEMENTS The authors would like to thank the Getty Conservation Institute for the support provided to conduct this scholarly work and for providing access to their knowledge and expertise.  ... 
doi:10.5194/isprs-archives-xlii-2-w15-1063-2019 fatcat:gqj76uvvevac7ajqf6r7ozsuoq

SPE: Security and Privacy Enhancement Framework for Mobile Devices

Brian Krupp, Nigamanth Sridhar, Wenbing Zhao
2017 IEEE Transactions on Dependable and Secure Computing  
In this paper, we present a security and privacy enhancement (SPE) framework for unmodified mobile operating systems.  ...  We utilize an existing ontology designed for enforcing security and privacy policies on mobile devices to build a policy that is customizable.  ...  ACKNOWLEDGMENTS This work is partially supported by a NSF CAREER award (CNS-0746632) and by a CSU Doctoral Research Award.  ... 
doi:10.1109/tdsc.2015.2465965 fatcat:jr7ngikrzzaobl55jrlegfgfwa

Quantifying Differential Privacy under Temporal Correlations

Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, Li Xiong
2017 2017 IEEE 33rd International Conference on Data Engineering (ICDE)  
Differential Privacy (DP) has received increasing attention as a rigorous privacy framework.  ...  However, this technique is not suitable for probabilistic correlations to finely prevent privacy leakage and may over-perturb the data as a result.  ...  supported by JSPS KAKENHI Grant Number 16K12437, the National Institute of Health (NIH) under award number R01GM114612, the Patient-Centered Outcomes Research Institute (PCORI) under contract ME-1310-07058, and  ... 
doi:10.1109/icde.2017.132 pmid:28883711 pmcid:PMC5584619 dblp:conf/icde/CaoYX017 fatcat:e7c56coaanfplp5xlagxuzfrai

Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations

Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, Li Xiong
2018 IEEE Transactions on Knowledge and Data Engineering  
Differential Privacy (DP) has received increasing attention as a rigorous privacy framework.  ...  Our analysis reveals that, the event-level privacy loss of a DP mechanism may increase over time. We call the unexpected privacy loss temporal privacy leakage (TPL).  ...  Pufferfish provides rigorous and customizable privacy framework which consists of three components: a set of secrets, a set of discriminative pairs and data evolution scenarios (how the data were generated  ... 
doi:10.1109/tkde.2018.2824328 pmid:31435181 pmcid:PMC6704013 fatcat:udvn5ssi2zds5gsbnk74kek6cu
« Previous Showing results 1 — 15 out of 1,293 results