98,927 Hits in 5.6 sec

Attribute Privacy: Framework and Mechanisms [article]

Wanrong Zhang, Olga Ohrimenko, Rachel Cummings
2021 arXiv   pre-print
We also provide two efficient mechanisms and one inefficient mechanism that satisfy attribute privacy for these settings.  ...  We propose definitions to capture attribute privacy in two relevant cases where global attributes may need to be protected: (1) properties of a specific dataset and (2) parameters of the underlying distribution  ...  We propose definitions for capturing dataset and distributional attribute privacy by instantiating a general privacy framework called the Pufferfish framework [KM14] .  ... 
arXiv:2009.04013v2 fatcat:y4zgwa5ydbhftnwjezvuw5f4t4

Attribute Privacy: Framework and Mechanisms

Wanrong Zhang, Olga Ohrimenko, Rachel Cummings
2022 2022 ACM Conference on Fairness, Accountability, and Transparency  
We also provide two efficient mechanisms for specific data distributions and one general but inefficient mechanism that satisfy attribute privacy for these settings.  ...  We base our results on a novel and non-trivial use of the Pufferfish framework to account for correlations across attributes in the data, thus addressing "the challenging problem of developing Pufferfish  ...  We propose definitions for capturing dataset and distributional attribute privacy by instantiating a general privacy framework called the Pufferfish framework [15] .  ... 
doi:10.1145/3531146.3533139 fatcat:6llolktyl5a2bnzmx4zei2w3fi

Privacy-aware Process Performance Indicators: Framework and Release Mechanisms [article]

Martin Kabierski, Stephan Fahrenkrog-Petersen, Matthias Weidlich
2021 arXiv   pre-print
These mechanisms are designed to provide provable guarantees in terms of differential privacy. We evaluate our framework and the release mechanisms in a series of controlled experiments.  ...  The results demonstrate feasibility and shed light on the trade-offs between data utility and privacy guarantees in the computation of PPIs.  ...  Section 3 introduces our framework for privacy-aware evaluation of PPIs, which is instantiated with specific release mechanisms in Section 4 and evaluated in Section 5.  ... 
arXiv:2103.11740v1 fatcat:4mbva4daazfzja5ayfqu3fz5ii

Poster: NSF CICI: UCSS: ACSP4HR: Assuring Cyber Security and Privacy for Human Resilience Research: Requirements, Framework, Architecture, Mechanisms and Prototype

Shouhuai Xu
2022 Zenodo  
ACSP4HR ❖ Designing a framework to analyze and quantify resilience of cryptographic infrastructures underlying ACSP4HR (and others) ❖ Designing tailored privacy-preserving computation algorithms for ACSP4HR  ...  requirements → HRR community's need of cyberinfrastructure ❖ Define ACSP4HR solution framework to meet these requirements ❖ Design an ACSP4HR architecture ❖ Investigate new mechanisms for the ACSP4HR  ... 
doi:10.5281/zenodo.6823917 fatcat:zeaflkxohngt5fbgskwntsjeva

On Privacy of Socially Contagious Attributes [article]

Aria Rezaei, Jie Gao
2019 arXiv   pre-print
In this paper, we take a closer look at the validity of Differential Privacy guarantees, when the sensitive attributes are subject to social influence and contagions.  ...  Then, we show that with the knowledge of the contagion network and model, one can do significantly better. We demonstrate that our method passes the performance limit imposed by differential privacy.  ...  ACKNOWLEDGEMENT Aria Rezaei and Jie Gao acknowledge support through NSF DMS-1737812, NSF CNS-1618391 and NSF CCF-1535900.  ... 
arXiv:1909.00543v1 fatcat:vkpr6weu7fd27aj2eqcxcndc6y

Privacy-Preserving Auditing for Attribute-Based Credentials [chapter]

Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
2014 Lecture Notes in Computer Science  
Privacy-enhancing attribute-based credentials (PABCs) allow users to authenticate to verifiers in a data-minimizing way, in the sense that users are unlinkable between authentications and only disclose  ...  We present a generic construction based on a signature, a signature of knowledge and a trapdoor commitment scheme, prove it secure in the universal composability framework, and give efficient instantiations  ...  Conclusion Data minimization is a basic privacy principle in authentication mechanisms.  ... 
doi:10.1007/978-3-319-11212-1_7 fatcat:edbybnjfmnghrf52kux3oivgwq

Attribute-Based Messaging

Rakesh Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana, Manoj Prabhakaran
2010 ACM Transactions on Privacy and Security  
senders to compose attribute addresses, a bridging mechanism that connects the ABM system with the enterprise messaging system, an ABM server that provides an interface to all enterprise users and other  ...  At a high level, we consider an ABM system to comprise the following components: an enterprise attribute database that provides user to attribute mapping functionality, a composition mechanism that enables  ...  grants from the MacArthur Foundation, the Sohaib and Sara Abbasi Fellowship, and Boeing Corporation.  ... 
doi:10.1145/1880022.1880025 fatcat:p3ylcv5xo5g4hluwi6v7twjrgu

Publishing Attributed Social Graphs with Formal Privacy Guarantees

Zach Jorgensen, Ting Yu, Graham Cormode
2016 Proceedings of the 2016 International Conference on Management of Data - SIGMOD '16  
We adapt existing graph models, and introduce a new one, and show how to augment them with meaningful privacy.  ...  Many data analysis tasks rely on the abstraction of a graph to represent relations between entities, with attributes on the nodes and edges.  ...  smooth sensitivity framework [25] , with the exponential mechanism [22] .  ... 
doi:10.1145/2882903.2915215 dblp:conf/sigmod/JorgensenYC16 fatcat:nsdou65txzethhmuykob7yp35e

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication [chapter]

Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
2013 IFIP Advances in Information and Communication Technology  
We define and unify the concepts and features of privacy-preserving attribute-based credentials (Privacy-ABCs) and provide a language framework in XML schema.  ...  In this paper, we aim to overcome this issue and simplify both the design and deployment of privacy-friendly authentication mechanisms.  ...  The authors thank Bart De Decker, Robert Enderlein, Lan Nguyen, and the anonymous referees for their valuable comments.  ... 
doi:10.1007/978-3-642-37282-7_4 fatcat:a2upj4ei7zcspkw5km5bmhcs4e

Application-driven Privacy-preserving Data Publishing with Correlated Attributes [article]

Aria Rezaei, Chaowei Xiao, Jie Gao, Bo Li, Sirajum Munir
2021 arXiv   pre-print
To address the privacy concerns of users in this environment, we propose a novel framework called PR-GAN that offers privacy-preserving mechanism using generative adversarial networks.  ...  We further show that our method provides privacy guarantees under the Pufferfish framework, an elegant generalization of the differential privacy that allows for the modeling of prior knowledge on data  ...  The trade-off between privacy and utility is builtin in our proposed framework.  ... 
arXiv:1812.10193v2 fatcat:uigkdmbawnbxpp7etq47pt3ype

Privacy-Preserving Adversarial Network (PPAN) for Continuous non-Gaussian Attributes [article]

Mohammadhadi Shateri, Fabrice Labeau
2020 arXiv   pre-print
The main idea of this model was using mutual information as the privacy measure and adversarial training of two deep neural networks, one as the mechanism and another as the adversary.  ...  A privacy-preserving adversarial network (PPAN) was recently proposed as an information-theoretical framework to address the issue of privacy in data sharing.  ...  Fig. 1 . 1 Privacy preserving model in an adversarial fashion. Seed noise U is concatenated to the observed data W and is used to provide randomization for mechanism network.  ... 
arXiv:2003.05362v1 fatcat:fpjd4tpsjrcezm35f2lkhwxtfy

An open framework for flexible plug-in privacy mechanisms in crowdsensing applications

Manos Katsomallos, Spyros Lalis, Thanasis Papaioannou, George Theodorakopoulos
2017 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)  
To achieve greater flexibility, we propose a framework that decouples the privacy mechanism from the application logic so that it can be developed by another, perhaps more trusted party, and which allows  ...  We describe a proof-of-concept implementation of the proposed framework for Android, where privacy mechanisms are independently developed as separate plug-in components.  ...  Diversity/Flexibility: Support the development of privacy mechanisms which may have different characteristics and may protect different privacy attributes.  ... 
doi:10.1109/percomw.2017.7917564 dblp:conf/percom/KatsomallosLPT17 fatcat:phmv7yxuk5ffbhyxc3qdnrd2oa

A Privacy-Enhanced Attribute-Based Access Control System [chapter]

Jan Kolter, Rolf Schillinger, Günther Pernul
2007 Lecture Notes in Computer Science  
In this respect, access control and privacy emerged to crucial factors.  ...  In this paper we take up concepts from the OASIS XACML and WS-XACML specifications and introduce a dynamic ABAC system that incorporates privacy preferences of the service requestor in the access control  ...  We thank our project partners for helpful comments and stimulating discussions.  ... 
doi:10.1007/978-3-540-73538-0_11 fatcat:xw47e2yp2na77g2gc7y5sd2elu

Answering Summation Queries for Numerical Attributes under Differential Privacy [article]

Yikai Wu, David Pujol, Ios Kotsogiannis, Ashwin Machanavajjhala
2019 arXiv   pre-print
We show that traditional techniques from the literature are not always the best choice and a more rigorous approach is necessary to develop low error algorithms.  ...  In this work we explore the problem of answering a set of sum queries under Differential Privacy. This is a little understood, non-trivial problem especially in the case of numerical domains.  ...  More specifically, CPS contains over 40k tuples corresponding to individuals and 4 attributes: income, race, gender, and marital status. We project on the income attribute to derive our dataset.  ... 
arXiv:1908.10268v1 fatcat:uer35pyh4rax7oz62zkaww7myi

Comprehensive Privacy Analysis on Federated Recommender System against Attribute Inference Attacks [article]

Shijie Zhang, Hongzhi Yin
2022 arXiv   pre-print
Therefore, we propose a novel adaptive privacy-preserving approach to protect users' sensitive data in the presence of attribute inference attacks and meanwhile maximize the recommendation accuracy.  ...  In this paper, we first design a novel attribute inference attacker to perform a comprehensive privacy analysis of the state-of-the-art federated recommender models.  ...  representative frameworks in the development of privacy-preserving systems.  ... 
arXiv:2205.11857v1 fatcat:jgoc5raoyrgwdnadsi66czzray
« Previous Showing results 1 — 15 out of 98,927 results