2,542 Hits in 5.4 sec

Privacy, accuracy, and consistency too

Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank McSherry, Kunal Talwar
2007 Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems - PODS '07  
However, all current techniques for reporting contingency tables fall short on at least one of privacy, accuracy, and consistency (among multiple released tables).  ...  Consequently there is an extensive and diverse literature dedicated to the problems of statistical disclosure control in contingency table release.  ...  ACKNOWLEDGEMENTS We would like to thank Larry Cox and Steve Fienberg for comments on an earlier version of this paper and general guidance though the statistics literature.  ... 
doi:10.1145/1265530.1265569 dblp:conf/pods/BarakCDKMT07 fatcat:7wwkttojdzbp3axpm4bi3kqyae


Graham Cormode, Entong Shen, Xi Gong, Ting Yu, Cecilia M. Procopiuc, Divesh Srivastava
2013 Proceedings of the 22nd ACM international conference on Conference on information & knowledge management - CIKM '13  
On the other side, concerns about individual privacy pull back, and seek to limit releases.  ...  Privacy technologies such as differential privacy have been proposed to resolve this deadlock, and there has been much study of how to perform private We lay out a set of principles for privacy tool design  ...  The UMicS system takes a holistic view of the practical requirements of data users, and offers an end-to-end solution to control the release and use of private data.  ... 
doi:10.1145/2505515.2505737 dblp:conf/cikm/CormodeSGYPS13 fatcat:rm3xufnnczeydi3asbvzmivluu

Differential Privacy for Protecting Multi-dimensional Contingency Table Data: Extensions and Applications

Xiaolin Yang, Stephen E. Fienberg, Alessandro Rinaldo
2012 Journal of Privacy and Confidentiality  
In a recent paper, Barak et al.[1] extend this approach to the release of a specified set of margins from a multi-way contingency table.  ...  We explore how well the mechanism works in the context of a series of examples, and the extent to which the proposed differential-privacy mechanism allows for sensible inferences from the released data  ...  Acknowledgement This research was partially supported by Army contract DAAD19-02-1-3-0389 to Cylab at Carnegie Mellon University and by NSF grants DMS-0631589 and BCS0941518.  ... 
doi:10.29012/jpc.v4i1.613 fatcat:qmnl5ewhpzhvbdzhh2uv436hdu

Data-Dependent Differentially Private Parameter Learning for Directed Graphical Models [article]

Amrita Roy Chowdhury, Theodoros Rekatsinas, Somesh Jha
2020 arXiv   pre-print
We compare our algorithm with a standard data-independent approach over a diverse suite of DGM benchmarks and demonstrate that our solution requires a privacy budget that is 3× smaller to obtain the same  ...  Our solution optimizes for the utility of inference queries over the DGM and adds noise that is customized to the properties of the private input dataset and the graph structure of the DGM.  ...  Privacy, accuracy, and consistency too: A holistic solution to contingency table release.  ... 
arXiv:1905.12813v3 fatcat:vg7evsbiybf3xntw6uo72cjpem

A process model leading to successful implementation of electronic health record systems

Mohammad I. Merhi
2015 International Journal of Electronic Healthcare  
These theories are also used to validate the model. A quantitative tool based on the maximised expected payoffs is used to assess the model and demonstrate its usefulness for best practices.  ...  His research interests include behavioural aspects of information security and privacy, effects of culture on information systems, and adoption and implementation of information systems including health  ...  The presented model is a holistic, flexible, and dynamic framework expected to help both researchers and practitioners.  ... 
doi:10.1504/ijeh.2015.075355 fatcat:opuwfyupefgflgglssmpx637ua

GDPR Compliance in the Context of Continuous Integration [article]

Ze Shi Li, Colin Werner, Neil Ernst, Daniela Damian
2020 arXiv   pre-print
The enactment of the General Data Protection Regulation (GDPR) in 2018 forced any organization that collects and/or processes EU-based personal data to comply with stringent privacy regulations.  ...  We first identified our collaborator's business problems and then iteratively developed two artifacts to address those problems: a set of operationalized GDPR principles, and an automated GDPR tool that  ...  ACKNOWLEDGMENTS The authors would like to thank the employees and collaborators at DataCorp for their time and effort in working with our research team.  ... 
arXiv:2002.06830v1 fatcat:nx5yoovxrnanfc6c363ahl25we

Statistical Data Privacy: A Song of Privacy and Utility [article]

Aleksandra Slavkovic, Jeremy Seeman
2022 arXiv   pre-print
To quantify trade-offs between increasing demand for open data sharing and concerns about sensitive information disclosure, statistical data privacy (SDP) methodology analyzes data release mechanisms which  ...  For inference problems, we may either design optimal release mechanisms and associated estimators that satisfy bounds on disclosure risk, or we may adjust existing sanitized output to create new optimal  ...  LV decides he will release a 2x2 contingency table of nobility vs. survival with different k-anonymity protections.  ... 
arXiv:2205.03336v1 fatcat:r5dz3jb52rh7ji22r3a4erhdd4

Privacy in Search Logs [article]

Michaela Goetz, Ashwin Machanavajjhala, Guozhang Wang, Xiaokui Xiao, Johannes Gehrke
2011 arXiv   pre-print
We then propose an algorithm ZEALOUS and show how to set its parameters to achieve (ϵ,δ)-probabilistic privacy.  ...  In this paper we analyze algorithms for publishing frequent keywords, queries and clicks of a search log.  ...  Acknowledgments We would like to thank our colleagues Filip Radlinski and Yisong Yue for helpful discussions about the usage of search logs.  ... 
arXiv:0904.0682v4 fatcat:etvjnfvpzfdd3gms34vk3gh6xu

Differential Privacy in Practice: Expose your Epsilons!

Cynthia Dwork, Nitin Kohli, Deirdre Mulligan
2019 Journal of Privacy and Confidentiality  
Because differential privacy allows us to quantify cumulative privacy loss, these differentially private systems will, for the first time, allow us to measure and compare the total privacy loss due to  ...  Implementations have been successfully leveraged in private industry, the public sector, and academia in a wide variety of applications, allowing scientists, engineers, and researchers the ability to learn  ...  "Using only published contingency tables (summary statistics), we applied the database reconstruction theorem to reconstruct record-level images for all 308,745,538 persons enumerated in the 2010 census  ... 
doi:10.29012/jpc.689 fatcat:nfzsjuzgrjbsjf4kvx432kq5zi

A Survey on Privacy for B5G/6G: New Privacy Goals, Challenges, and Research Directions [article]

Chamara Sandeepa, Bartlomiej Siniarski, Nicolas Kourtellis, Shen Wang, Madhusanka Liyanage
2022 arXiv   pre-print
Next, this work provides a set of solutions applicable to the proposed architecture of B5G/6G networks to mitigate the challenges.  ...  Based on the taxonomy, the paper then conceptualizes a set of privacy goals for the B5G/6G and the challenges that appear as barriers to reaching these goals.  ...  ACKNOWLEDGEMENT This work is partly supported by European Union in SPA-TIAL (Grant No: 101021808), Academy of Finland in 6Genesis (grant no. 318927) and Science Foundation Ireland under CONNECT phase 2  ... 
arXiv:2203.04264v1 fatcat:blbzfjy73fhlvammlwsgfmso5y

"Unblackboxing" Decision Makers' Interpretations of IS Certifications in the Context of Cloud Service Certifications

Jens Lansing, Alexander Benlian, Ali Sunyaev
2018 Journal of the AIS  
, and information security solutions.  ...  elements, as well as examining key features that might lead to a more favorable evaluation of a certification by decision makers.  ...  About the Authors Jens Lansing is a PhD candidate at the University of Cologne, Germany.  ... 
doi:10.17705/1jais.00520 fatcat:3nmrcitz5vdjxpvrvhsfybdyse

Fog computing security: a review of current applications and security solutions

Saad Khan, Simon Parkinson, Yongrui Qin
2017 Journal of Cloud Computing: Advances, Systems and Applications  
Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process.  ...  This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog  ...  To provide a holistic review, Fog related technologies like Edge computing and Cloudlets are also discussed.  ... 
doi:10.1186/s13677-017-0090-3 fatcat:g3q3q3ctf5coteaycnceib522u

An extensive review of data security infrastructure and legislature

Harshit Bhavnani, Shreyansh Bardia, Aniket Modi, Ujwal Shah
2021 Security and Privacy  
However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks.  ...  implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones.  ...  using fuzzy algorithms indicate a performance accuracy of up to 99.6%.  ... 
doi:10.1002/spy2.189 fatcat:ht3pde37e5e2tk4ptpnenou4qy

Privacy-preserving solutions for Blockchain: review and challenges

Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
2019 IEEE Access  
To deal with these challenges, novel privacy-preserving solutions for blockchain based on crypto-privacy techniques are emerging to empower users with mechanisms to become anonymous and take control of  ...  In this sense, this paper performs a systematic review of the current state of the art on privacy-preserving research solutions and mechanisms in blockchain, as well as the main associated privacy challenges  ...  Despite important analyzed efforts to devise and integrate novel crypto-privacy techniques, current blockchain solutions are still far to cope with those privacy challenges in an holistic way.  ... 
doi:10.1109/access.2019.2950872 fatcat:kf2rl7onmrbvnozjudspxrcatu


2009 International Journal of Information Technology and Decision Making  
We introduce a proper multicriteria decision support system (MCDSS) that first determines the set of Pareto-efficient solutions and then allows the decision-maker to interactively filter and/or explore  ...  When selecting a research portfolio, the decision-maker thus needs to take into consideration both current and future competence requirements, as well as other financial and non-financial objectives and  ...  Acknowledgments The authors would like to thank Rudolf Vetschera for helpful comments on an earlier version of this paper as well as Karl Fröschl, Research Director at the EC3, for valuable discussions  ... 
doi:10.1142/s0219622009003429 fatcat:q6hpkzhcrzd65egzhzcovcsoz4
« Previous Showing results 1 — 15 out of 2,542 results