A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy, accuracy, and consistency too
2007
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems - PODS '07
However, all current techniques for reporting contingency tables fall short on at least one of privacy, accuracy, and consistency (among multiple released tables). ...
Consequently there is an extensive and diverse literature dedicated to the problems of statistical disclosure control in contingency table release. ...
ACKNOWLEDGEMENTS We would like to thank Larry Cox and Steve Fienberg for comments on an earlier version of this paper and general guidance though the statistics literature. ...
doi:10.1145/1265530.1265569
dblp:conf/pods/BarakCDKMT07
fatcat:7wwkttojdzbp3axpm4bi3kqyae
On the other side, concerns about individual privacy pull back, and seek to limit releases. ...
Privacy technologies such as differential privacy have been proposed to resolve this deadlock, and there has been much study of how to perform private We lay out a set of principles for privacy tool design ...
The UMicS system takes a holistic view of the practical requirements of data users, and offers an end-to-end solution to control the release and use of private data. ...
doi:10.1145/2505515.2505737
dblp:conf/cikm/CormodeSGYPS13
fatcat:rm3xufnnczeydi3asbvzmivluu
Differential Privacy for Protecting Multi-dimensional Contingency Table Data: Extensions and Applications
2012
Journal of Privacy and Confidentiality
In a recent paper, Barak et al.[1] extend this approach to the release of a specified set of margins from a multi-way contingency table. ...
We explore how well the mechanism works in the context of a series of examples, and the extent to which the proposed differential-privacy mechanism allows for sensible inferences from the released data ...
Acknowledgement This research was partially supported by Army contract DAAD19-02-1-3-0389 to Cylab at Carnegie Mellon University and by NSF grants DMS-0631589 and BCS0941518. ...
doi:10.29012/jpc.v4i1.613
fatcat:qmnl5ewhpzhvbdzhh2uv436hdu
Data-Dependent Differentially Private Parameter Learning for Directed Graphical Models
[article]
2020
arXiv
pre-print
We compare our algorithm with a standard data-independent approach over a diverse suite of DGM benchmarks and demonstrate that our solution requires a privacy budget that is 3× smaller to obtain the same ...
Our solution optimizes for the utility of inference queries over the DGM and adds noise that is customized to the properties of the private input dataset and the graph structure of the DGM. ...
Privacy, accuracy, and consistency
too: A holistic solution to contingency table release. ...
arXiv:1905.12813v3
fatcat:vg7evsbiybf3xntw6uo72cjpem
A process model leading to successful implementation of electronic health record systems
2015
International Journal of Electronic Healthcare
These theories are also used to validate the model. A quantitative tool based on the maximised expected payoffs is used to assess the model and demonstrate its usefulness for best practices. ...
His research interests include behavioural aspects of information security and privacy, effects of culture on information systems, and adoption and implementation of information systems including health ...
The presented model is a holistic, flexible, and dynamic framework expected to help both researchers and practitioners. ...
doi:10.1504/ijeh.2015.075355
fatcat:opuwfyupefgflgglssmpx637ua
GDPR Compliance in the Context of Continuous Integration
[article]
2020
arXiv
pre-print
The enactment of the General Data Protection Regulation (GDPR) in 2018 forced any organization that collects and/or processes EU-based personal data to comply with stringent privacy regulations. ...
We first identified our collaborator's business problems and then iteratively developed two artifacts to address those problems: a set of operationalized GDPR principles, and an automated GDPR tool that ...
ACKNOWLEDGMENTS The authors would like to thank the employees and collaborators at DataCorp for their time and effort in working with our research team. ...
arXiv:2002.06830v1
fatcat:nx5yoovxrnanfc6c363ahl25we
Statistical Data Privacy: A Song of Privacy and Utility
[article]
2022
arXiv
pre-print
To quantify trade-offs between increasing demand for open data sharing and concerns about sensitive information disclosure, statistical data privacy (SDP) methodology analyzes data release mechanisms which ...
For inference problems, we may either design optimal release mechanisms and associated estimators that satisfy bounds on disclosure risk, or we may adjust existing sanitized output to create new optimal ...
LV decides he will release a 2x2 contingency table of nobility vs. survival with different k-anonymity protections. ...
arXiv:2205.03336v1
fatcat:r5dz3jb52rh7ji22r3a4erhdd4
Privacy in Search Logs
[article]
2011
arXiv
pre-print
We then propose an algorithm ZEALOUS and show how to set its parameters to achieve (ϵ,δ)-probabilistic privacy. ...
In this paper we analyze algorithms for publishing frequent keywords, queries and clicks of a search log. ...
Acknowledgments We would like to thank our colleagues Filip Radlinski and Yisong Yue for helpful discussions about the usage of search logs. ...
arXiv:0904.0682v4
fatcat:etvjnfvpzfdd3gms34vk3gh6xu
Differential Privacy in Practice: Expose your Epsilons!
2019
Journal of Privacy and Confidentiality
Because differential privacy allows us to quantify cumulative privacy loss, these differentially private systems will, for the first time, allow us to measure and compare the total privacy loss due to ...
Implementations have been successfully leveraged in private industry, the public sector, and academia in a wide variety of applications, allowing scientists, engineers, and researchers the ability to learn ...
"Using only published contingency tables (summary statistics), we applied the database reconstruction theorem to reconstruct record-level images for all 308,745,538 persons enumerated in the 2010 census ...
doi:10.29012/jpc.689
fatcat:nfzsjuzgrjbsjf4kvx432kq5zi
A Survey on Privacy for B5G/6G: New Privacy Goals, Challenges, and Research Directions
[article]
2022
arXiv
pre-print
Next, this work provides a set of solutions applicable to the proposed architecture of B5G/6G networks to mitigate the challenges. ...
Based on the taxonomy, the paper then conceptualizes a set of privacy goals for the B5G/6G and the challenges that appear as barriers to reaching these goals. ...
ACKNOWLEDGEMENT This work is partly supported by European Union in SPA-TIAL (Grant No: 101021808), Academy of Finland in 6Genesis (grant no. 318927) and Science Foundation Ireland under CONNECT phase 2 ...
arXiv:2203.04264v1
fatcat:blbzfjy73fhlvammlwsgfmso5y
"Unblackboxing" Decision Makers' Interpretations of IS Certifications in the Context of Cloud Service Certifications
2018
Journal of the AIS
, and information security solutions. ...
elements, as well as examining key features that might lead to a more favorable evaluation of a certification by decision makers. ...
About the Authors Jens Lansing is a PhD candidate at the University of Cologne, Germany. ...
doi:10.17705/1jais.00520
fatcat:3nmrcitz5vdjxpvrvhsfybdyse
Fog computing security: a review of current applications and security solutions
2017
Journal of Cloud Computing: Advances, Systems and Applications
Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. ...
This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog ...
To provide a holistic review, Fog related technologies like Edge computing and Cloudlets are also discussed. ...
doi:10.1186/s13677-017-0090-3
fatcat:g3q3q3ctf5coteaycnceib522u
An extensive review of data security infrastructure and legislature
2021
Security and Privacy
However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. ...
implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones. ...
using fuzzy algorithms indicate a performance accuracy of up to 99.6%. ...
doi:10.1002/spy2.189
fatcat:ht3pde37e5e2tk4ptpnenou4qy
Privacy-preserving solutions for Blockchain: review and challenges
2019
IEEE Access
To deal with these challenges, novel privacy-preserving solutions for blockchain based on crypto-privacy techniques are emerging to empower users with mechanisms to become anonymous and take control of ...
In this sense, this paper performs a systematic review of the current state of the art on privacy-preserving research solutions and mechanisms in blockchain, as well as the main associated privacy challenges ...
Despite important analyzed efforts to devise and integrate novel crypto-privacy techniques, current blockchain solutions are still far to cope with those privacy challenges in an holistic way. ...
doi:10.1109/access.2019.2950872
fatcat:kf2rl7onmrbvnozjudspxrcatu
A MULTICRITERIA DECISION SUPPORT SYSTEM FOR COMPETENCE-DRIVEN PROJECT PORTFOLIO SELECTION
2009
International Journal of Information Technology and Decision Making
We introduce a proper multicriteria decision support system (MCDSS) that first determines the set of Pareto-efficient solutions and then allows the decision-maker to interactively filter and/or explore ...
When selecting a research portfolio, the decision-maker thus needs to take into consideration both current and future competence requirements, as well as other financial and non-financial objectives and ...
Acknowledgments The authors would like to thank Rudolf Vetschera for helpful comments on an earlier version of this paper as well as Karl Fröschl, Research Director at the EC3, for valuable discussions ...
doi:10.1142/s0219622009003429
fatcat:q6hpkzhcrzd65egzhzcovcsoz4
« Previous
Showing results 1 — 15 out of 2,542 results