Filters








42,363 Hits in 2.7 sec

Protecting source privacy in federated search

Wei Jiang, Luo Si, Jing Li
2007 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '07  
As far as we know, this is the first attempt to address the research problem of protecting source privacy in federated text search.  ...  Therefore, this paper proposes a two-step federated search protocol that protects the privacy of information sources.  ...  In order to benefit from these information, source privacy needs to be protected in the federated search environment, while traditional fed-Permission to make digital or hard copies of all or part of this  ... 
doi:10.1145/1277741.1277896 dblp:conf/sigir/JiangSL07 fatcat:u2bbg6dq6vgz7kyy2cw2acshhu

Privacy and abortion rights under the Louisiana state constitution: could Roe v. Wade be alive and well in the Bayou state?

John Devlin
1991 Louisiana law review  
Bolton, 3 and the continued existence and future contours of the federal constitutional right to choose an abortion that was recognized in those cases. 4  ...  Ct. 507 (1967), in which the Court held that federal fourth amendment protections against unreasonable searches and seizures apply where, but only where, the person has a "reasonable expectation of privacy  ...  In Illinois, in contrast, the state constitutional privacy provision was initially and for many years interpreted narrowly, as protecting only traditional rights against unreasonable searches and seizures  ... 
pmid:11656097 fatcat:m6htl54fuzaw7hmueatt3kz62e

Federalism, Privacy Rights, and Intergovernmental Management of Surveillance: Legal and Policy Issues [chapter]

Michael W.
2011 Video Surveillance  
In addition to the federally protected rights in the 1st, 4th, 5th, and 9th Amendments, it must be noted that over half of the States have an enumerated right to privacy protection in their constitutions  ...  Recent survey research findings Protection of privacy in video surveillance addresses constitutional and civil liberties protections across the institutions of federalism.  ...  Federalism, Privacy Rights, and Intergovernmental Management of Surveillance: Legal and Policy Issues, Video Surveillance, Prof.  ... 
doi:10.5772/14931 fatcat:sc67ntozs5dyrka4ijtcevdvlm

Fighting pandemics with digital epidemiology

Sasu Tarkoma, Suliman Alghnam, Michael D. Howell
2020 EClinicalMedicine  
sharing, combining, and privacy-protecting data [5] .  ...  State-of-the-art privacy solutions include data aggregation, data anonymization, differential privacy (DP), federated learning, and synthetic data generation techniques.  ... 
doi:10.1016/j.eclinm.2020.100512 pmid:32864592 pmcid:PMC7446704 fatcat:zdxur33gh5cghp4s3hmhyixjru

Page 28 of The Information Management Journal Vol. 13, Issue 1 [page]

1979 The Information Management Journal  
C. 552a), was passed by Congress in recognition that the privacy of the individual must be protected by control of the collection, maintenance, use and dissemination of information by Federal agencies.  ...  Foremost is the belief that the individual should be protected from excesses of government. The Bill of Rights rights to the in- dividual in order to protect him from government.  ... 

A Systematic Literature Review on Federated Learning: From A Model Quality Perspective [article]

Yi Liu, Li Zhang, Ning Ge, Guanghao Li
2020 arXiv   pre-print
As an emerging technique, Federated Learning (FL) can jointly train a global model with the data remaining locally, which effectively solves the problem of data privacy protection through the encryption  ...  We are also interested in the research and application trends of FL and the effect comparison between FL and non-FL because the practitioners usually worry that achieving privacy protection needs compromising  ...  privacy protection in FL.  ... 
arXiv:2012.01973v1 fatcat:64yt53gdavfavmi5puj4rflknm

Page 246 of Florida Bar Journal Vol. 55, Issue 3 [page]

1981 Florida Bar Journal  
II In November 1980 Florida created a constitutional right to privacy.  ...  R.C_ 8 439 U.S. at 134. 9 By doing so, the federal courts are returning the common law collateral source rule. Adams v. New York, 192 U.S. 585 (1903).  ... 

Graph-based Interactive Data Federation System for Heterogeneous Data Retrieval and Analytics

Xuan-Son Vu, Addi Ait-Mlouk, Erik Elmroth, Lili Jiang
2019 The World Wide Web Conference on - WWW '19  
The system first creates a Virtual Database (VDB) to virtually integrate data from multiple data sources.  ...  The potential of data federation is largely untapped, this paper presents an interactive data federation system (https://vimeo.com/ 319473546) by applying large-scale techniques including heterogeneous  ...  ACKNOWLEDGEMENT This research is funded by Umeå University in Sweden on federated database research.  ... 
doi:10.1145/3308558.3314138 dblp:conf/www/VuAEJ19 fatcat:6gzk63lep5d53ntedrrz5qvldi

Privacy in Open Search: A Review of Challenges and Solutions

Samuel Sousa, Christian Guetl, Roman Kern
2022 Zenodo  
Appeared in: Open Search Symposium 2021, 11-13 October 2021, CERN, Geneva, Switzerland.  ...  Secondly, we describe open challenges and solutions for privacy preservation in open search tasks in section Privacy Challenges and Solutions.  ...  ML-based approaches Federated learning. FL is a methodology for training ML models in distributed computation scenarios proposed by Google [37] .  ... 
doi:10.5281/zenodo.5887680 fatcat:hnwrhs7bbbbgdbtjmwhkoik5ei

Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation

Stephen E. Fienberg
2006 Statistical Science  
Even with encryption and other nominal forms of protection for individual databases, we still need to protect against the violation of privacy through linkages across multiple databases.  ...  perpetrators of future attacks, as well as an unprecedented expansion of federal government data mining activities, many involving databases containing personal information.  ...  This paper is based in part on an earlier and much shorter paper focusing on homeland security issues; see [16] .  ... 
doi:10.1214/088342306000000240 fatcat:hb3kzvlcwrgxnnnbszjccng2vi

Privacy in Open Search: A Review of Challenges and Solutions [article]

Samuel Sousa, Christian Guetl, Roman Kern
2021 arXiv   pre-print
data protection laws.  ...  Artificial intelligence areas, such as machine learning and natural language processing, have already successfully employed privacy-preserving mechanisms in order to safeguard data privacy in a vast number  ...  Secondly, we describe open challenges and solutions for privacy preservation in open search tasks in section Privacy Challenges and Solutions.  ... 
arXiv:2110.10720v2 fatcat:lodtwxmakvdrtngy54mn3j4joy

THE LAW OF MEDICAL PRIVACY IN THE USA: NOT GOOD ENOUGH FOR COVID-19

Dean M. Harris
2021 Medicne pravo  
It analyzes the scope and requirements of federal and state laws in the US, and it discusses the weaknesses in the US protection of medical privacy.  ...  Then, this article explains how the weak US system of privacy protection was unable to handle many important privacy issues in the COVID-19 pandemic.  ...  It analyzes the scope and requirements of federal and state laws in the US, and it discusses the weaknesses in the US protection of medical privacy.  ... 
doi:10.25040/medicallaw2021.01.028 fatcat:xh6uzzdocjc7bmjiyho4zmc5jm

The Supreme Court and information privacy

F. H. Cate, B. E. Cate
2012 International Data Protecion Law  
† Advances in technology-including the growing use of cloud computing by individuals, agencies, and organizations to conduct operations and store and process records-are enabling the systematic collection  ...  and use of personal data by state and federal governments for a variety of purposes. † These purposes range from battling crime and terrorism to assessing public policy initiatives and enforcing regulatory  ...  Constitutional sources of a privacy right Fundamental rights in the United States are articulated in the federal Constitution.  ... 
doi:10.1093/idpl/ips024 fatcat:apmak4tovjhz5nmlkcr7x6apce

Implementation of Privacy and Security for a Genomic Information System Based on Standards

Silvia Llorente, Jaime Delgado
2022 Journal of Personalized Medicine  
In order to solve, among other things, the privacy provision issue, we proposed the GIPAMS (Genomic Information Protection And Management System) modular architecture, which is based on the use of standards  ...  Therefore, privacy provision is key to protecting genomic information from unauthorized access.  ...  Once a GIPAMS federation is established, new services and opportunities for researchers may arise, based on the federated search.  ... 
doi:10.3390/jpm12060915 fatcat:sifo7dhq4bh6fl4a5nbyytk2cy

Escalating U.S. Police Surveillance after 9/11: an Examination of Causes and Effects

William Bloss
2002 Surveillance & Society  
In the post-9/11 era, changes in federal law, court interpretation of privacy safeguards, and technological advances have expanded the circumstances and methods by which the police may engage in surveillance  ...  The analysis suggests that increasing police surveillance has diminished individual privacy protections and impacted aspects of civil life.  ...  Much of the technological advances in private electronic communication are protected by either federal statutes (i.e., Electronic Communications Privacy Act) or the courts.  ... 
doi:10.24908/ss.v4i3.3448 fatcat:ta7eo4p3fbebvmtcdoph7e55c4
« Previous Showing results 1 — 15 out of 42,363 results