A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Protecting source privacy in federated search
2007
Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '07
As far as we know, this is the first attempt to address the research problem of protecting source privacy in federated text search. ...
Therefore, this paper proposes a two-step federated search protocol that protects the privacy of information sources. ...
In order to benefit from these information, source privacy needs to be protected in the federated search environment, while traditional fed-Permission to make digital or hard copies of all or part of this ...
doi:10.1145/1277741.1277896
dblp:conf/sigir/JiangSL07
fatcat:u2bbg6dq6vgz7kyy2cw2acshhu
Privacy and abortion rights under the Louisiana state constitution: could Roe v. Wade be alive and well in the Bayou state?
1991
Louisiana law review
Bolton, 3 and the continued existence and future contours of the federal constitutional right to choose an abortion that was recognized in those cases. 4 ...
Ct. 507 (1967), in which the Court held that federal fourth amendment protections against unreasonable searches and seizures apply where, but only where, the person has a "reasonable expectation of privacy ...
In Illinois, in contrast, the state constitutional privacy provision was initially and for many years interpreted narrowly, as protecting only traditional rights against unreasonable searches and seizures ...
pmid:11656097
fatcat:m6htl54fuzaw7hmueatt3kz62e
Federalism, Privacy Rights, and Intergovernmental Management of Surveillance: Legal and Policy Issues
[chapter]
2011
Video Surveillance
In addition to the federally protected rights in the 1st, 4th, 5th, and 9th Amendments, it must be noted that over half of the States have an enumerated right to privacy protection in their constitutions ...
Recent survey research findings Protection of privacy in video surveillance addresses constitutional and civil liberties protections across the institutions of federalism. ...
Federalism, Privacy Rights, and Intergovernmental Management of Surveillance: Legal and Policy Issues, Video Surveillance, Prof. ...
doi:10.5772/14931
fatcat:sc67ntozs5dyrka4ijtcevdvlm
Fighting pandemics with digital epidemiology
2020
EClinicalMedicine
sharing, combining, and privacy-protecting data [5] . ...
State-of-the-art privacy solutions include data aggregation, data anonymization, differential privacy (DP), federated learning, and synthetic data generation techniques. ...
doi:10.1016/j.eclinm.2020.100512
pmid:32864592
pmcid:PMC7446704
fatcat:zdxur33gh5cghp4s3hmhyixjru
Page 28 of The Information Management Journal Vol. 13, Issue 1
[page]
1979
The Information Management Journal
C. 552a), was passed by Congress in recognition that the privacy of the individual must be protected by control of the collection, maintenance, use and dissemination of information by Federal agencies. ...
Foremost is the belief that the individual should be protected from excesses of government. The Bill of Rights rights to the in- dividual in order to protect him from government. ...
A Systematic Literature Review on Federated Learning: From A Model Quality Perspective
[article]
2020
arXiv
pre-print
As an emerging technique, Federated Learning (FL) can jointly train a global model with the data remaining locally, which effectively solves the problem of data privacy protection through the encryption ...
We are also interested in the research and application trends of FL and the effect comparison between FL and non-FL because the practitioners usually worry that achieving privacy protection needs compromising ...
privacy protection in FL. ...
arXiv:2012.01973v1
fatcat:64yt53gdavfavmi5puj4rflknm
Page 246 of Florida Bar Journal Vol. 55, Issue 3
[page]
1981
Florida Bar Journal
II In November 1980 Florida created a constitutional right to privacy. ...
R.C_
8 439 U.S. at 134.
9 By doing so, the federal courts are returning the common law collateral source rule. Adams v. New York, 192 U.S. 585 (1903). ...
Graph-based Interactive Data Federation System for Heterogeneous Data Retrieval and Analytics
2019
The World Wide Web Conference on - WWW '19
The system first creates a Virtual Database (VDB) to virtually integrate data from multiple data sources. ...
The potential of data federation is largely untapped, this paper presents an interactive data federation system (https://vimeo.com/ 319473546) by applying large-scale techniques including heterogeneous ...
ACKNOWLEDGEMENT This research is funded by Umeå University in Sweden on federated database research. ...
doi:10.1145/3308558.3314138
dblp:conf/www/VuAEJ19
fatcat:6gzk63lep5d53ntedrrz5qvldi
Privacy in Open Search: A Review of Challenges and Solutions
2022
Zenodo
Appeared in: Open Search Symposium 2021, 11-13 October 2021, CERN, Geneva, Switzerland. ...
Secondly, we describe open challenges and solutions for privacy preservation in open search tasks in section Privacy Challenges and Solutions. ...
ML-based approaches Federated learning. FL is a methodology for training ML models in distributed computation scenarios proposed by Google [37] . ...
doi:10.5281/zenodo.5887680
fatcat:hnwrhs7bbbbgdbtjmwhkoik5ei
Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation
2006
Statistical Science
Even with encryption and other nominal forms of protection for individual databases, we still need to protect against the violation of privacy through linkages across multiple databases. ...
perpetrators of future attacks, as well as an unprecedented expansion of federal government data mining activities, many involving databases containing personal information. ...
This paper is based in part on an earlier and much shorter paper focusing on homeland security issues; see [16] . ...
doi:10.1214/088342306000000240
fatcat:hb3kzvlcwrgxnnnbszjccng2vi
Privacy in Open Search: A Review of Challenges and Solutions
[article]
2021
arXiv
pre-print
data protection laws. ...
Artificial intelligence areas, such as machine learning and natural language processing, have already successfully employed privacy-preserving mechanisms in order to safeguard data privacy in a vast number ...
Secondly, we describe open challenges and solutions for privacy preservation in open search tasks in section Privacy Challenges and Solutions. ...
arXiv:2110.10720v2
fatcat:lodtwxmakvdrtngy54mn3j4joy
THE LAW OF MEDICAL PRIVACY IN THE USA: NOT GOOD ENOUGH FOR COVID-19
2021
Medicne pravo
It analyzes the scope and requirements of federal and state laws in the US, and it discusses the weaknesses in the US protection of medical privacy. ...
Then, this article explains how the weak US system of privacy protection was unable to handle many important privacy issues in the COVID-19 pandemic. ...
It analyzes the scope and requirements of federal and state laws in the US, and it discusses the weaknesses in the US protection of medical privacy. ...
doi:10.25040/medicallaw2021.01.028
fatcat:xh6uzzdocjc7bmjiyho4zmc5jm
The Supreme Court and information privacy
2012
International Data Protecion Law
† Advances in technology-including the growing use of cloud computing by individuals, agencies, and organizations to conduct operations and store and process records-are enabling the systematic collection ...
and use of personal data by state and federal governments for a variety of purposes. † These purposes range from battling crime and terrorism to assessing public policy initiatives and enforcing regulatory ...
Constitutional sources of a privacy right Fundamental rights in the United States are articulated in the federal Constitution. ...
doi:10.1093/idpl/ips024
fatcat:apmak4tovjhz5nmlkcr7x6apce
Implementation of Privacy and Security for a Genomic Information System Based on Standards
2022
Journal of Personalized Medicine
In order to solve, among other things, the privacy provision issue, we proposed the GIPAMS (Genomic Information Protection And Management System) modular architecture, which is based on the use of standards ...
Therefore, privacy provision is key to protecting genomic information from unauthorized access. ...
Once a GIPAMS federation is established, new services and opportunities for researchers may arise, based on the federated search. ...
doi:10.3390/jpm12060915
fatcat:sifo7dhq4bh6fl4a5nbyytk2cy
Escalating U.S. Police Surveillance after 9/11: an Examination of Causes and Effects
2002
Surveillance & Society
In the post-9/11 era, changes in federal law, court interpretation of privacy safeguards, and technological advances have expanded the circumstances and methods by which the police may engage in surveillance ...
The analysis suggests that increasing police surveillance has diminished individual privacy protections and impacted aspects of civil life. ...
Much of the technological advances in private electronic communication are protected by either federal statutes (i.e., Electronic Communications Privacy Act) or the courts. ...
doi:10.24908/ss.v4i3.3448
fatcat:ta7eo4p3fbebvmtcdoph7e55c4
« Previous
Showing results 1 — 15 out of 42,363 results