A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
As far as we know, this is the first attempt to address the research problem of protecting source privacy in federated text search. ... Therefore, this paper proposes a two-step federated search protocol that protects the privacy of information sources. ... In order to benefit from these information, source privacy needs to be protected in the federated search environment, while traditional fed-Permission to make digital or hard copies of all or part of this ...doi:10.1145/1277741.1277896 dblp:conf/sigir/JiangSL07 fatcat:u2bbg6dq6vgz7kyy2cw2acshhu
Louisiana law review
Bolton, 3 and the continued existence and future contours of the federal constitutional right to choose an abortion that was recognized in those cases. 4 ... Ct. 507 (1967), in which the Court held that federal fourth amendment protections against unreasonable searches and seizures apply where, but only where, the person has a "reasonable expectation of privacy ... In Illinois, in contrast, the state constitutional privacy provision was initially and for many years interpreted narrowly, as protecting only traditional rights against unreasonable searches and seizures ...pmid:11656097 fatcat:m6htl54fuzaw7hmueatt3kz62e
In addition to the federally protected rights in the 1st, 4th, 5th, and 9th Amendments, it must be noted that over half of the States have an enumerated right to privacy protection in their constitutions ... Recent survey research findings Protection of privacy in video surveillance addresses constitutional and civil liberties protections across the institutions of federalism. ... Federalism, Privacy Rights, and Intergovernmental Management of Surveillance: Legal and Policy Issues, Video Surveillance, Prof. ...doi:10.5772/14931 fatcat:sc67ntozs5dyrka4ijtcevdvlm
sharing, combining, and privacy-protecting data  . ... State-of-the-art privacy solutions include data aggregation, data anonymization, differential privacy (DP), federated learning, and synthetic data generation techniques. ...doi:10.1016/j.eclinm.2020.100512 pmid:32864592 pmcid:PMC7446704 fatcat:zdxur33gh5cghp4s3hmhyixjru
The Information Management Journal
C. 552a), was passed by Congress in recognition that the privacy of the individual must be protected by control of the collection, maintenance, use and dissemination of information by Federal agencies. ... Foremost is the belief that the individual should be protected from excesses of government. The Bill of Rights rights to the in- dividual in order to protect him from government. ...
As an emerging technique, Federated Learning (FL) can jointly train a global model with the data remaining locally, which effectively solves the problem of data privacy protection through the encryption ... We are also interested in the research and application trends of FL and the effect comparison between FL and non-FL because the practitioners usually worry that achieving privacy protection needs compromising ... privacy protection in FL. ...arXiv:2012.01973v1 fatcat:64yt53gdavfavmi5puj4rflknm
Florida Bar Journal
II In November 1980 Florida created a constitutional right to privacy. ... R.C_ 8 439 U.S. at 134. 9 By doing so, the federal courts are returning the common law collateral source rule. Adams v. New York, 192 U.S. 585 (1903). ...
The system first creates a Virtual Database (VDB) to virtually integrate data from multiple data sources. ... The potential of data federation is largely untapped, this paper presents an interactive data federation system (https://vimeo.com/ 319473546) by applying large-scale techniques including heterogeneous ... ACKNOWLEDGEMENT This research is funded by Umeå University in Sweden on federated database research. ...doi:10.1145/3308558.3314138 dblp:conf/www/VuAEJ19 fatcat:6gzk63lep5d53ntedrrz5qvldi
Appeared in: Open Search Symposium 2021, 11-13 October 2021, CERN, Geneva, Switzerland. ... Secondly, we describe open challenges and solutions for privacy preservation in open search tasks in section Privacy Challenges and Solutions. ... ML-based approaches Federated learning. FL is a methodology for training ML models in distributed computation scenarios proposed by Google  . ...doi:10.5281/zenodo.5887680 fatcat:hnwrhs7bbbbgdbtjmwhkoik5ei
Even with encryption and other nominal forms of protection for individual databases, we still need to protect against the violation of privacy through linkages across multiple databases. ... perpetrators of future attacks, as well as an unprecedented expansion of federal government data mining activities, many involving databases containing personal information. ... This paper is based in part on an earlier and much shorter paper focusing on homeland security issues; see  . ...doi:10.1214/088342306000000240 fatcat:hb3kzvlcwrgxnnnbszjccng2vi
data protection laws. ... Artificial intelligence areas, such as machine learning and natural language processing, have already successfully employed privacy-preserving mechanisms in order to safeguard data privacy in a vast number ... Secondly, we describe open challenges and solutions for privacy preservation in open search tasks in section Privacy Challenges and Solutions. ...arXiv:2110.10720v2 fatcat:lodtwxmakvdrtngy54mn3j4joy
It analyzes the scope and requirements of federal and state laws in the US, and it discusses the weaknesses in the US protection of medical privacy. ... Then, this article explains how the weak US system of privacy protection was unable to handle many important privacy issues in the COVID-19 pandemic. ... It analyzes the scope and requirements of federal and state laws in the US, and it discusses the weaknesses in the US protection of medical privacy. ...doi:10.25040/medicallaw2021.01.028 fatcat:xh6uzzdocjc7bmjiyho4zmc5jm
† Advances in technology-including the growing use of cloud computing by individuals, agencies, and organizations to conduct operations and store and process records-are enabling the systematic collection ... and use of personal data by state and federal governments for a variety of purposes. † These purposes range from battling crime and terrorism to assessing public policy initiatives and enforcing regulatory ... Constitutional sources of a privacy right Fundamental rights in the United States are articulated in the federal Constitution. ...doi:10.1093/idpl/ips024 fatcat:apmak4tovjhz5nmlkcr7x6apce
In order to solve, among other things, the privacy provision issue, we proposed the GIPAMS (Genomic Information Protection And Management System) modular architecture, which is based on the use of standards ... Therefore, privacy provision is key to protecting genomic information from unauthorized access. ... Once a GIPAMS federation is established, new services and opportunities for researchers may arise, based on the federated search. ...doi:10.3390/jpm12060915 fatcat:sifo7dhq4bh6fl4a5nbyytk2cy
In the post-9/11 era, changes in federal law, court interpretation of privacy safeguards, and technological advances have expanded the circumstances and methods by which the police may engage in surveillance ... The analysis suggests that increasing police surveillance has diminished individual privacy protections and impacted aspects of civil life. ... Much of the technological advances in private electronic communication are protected by either federal statutes (i.e., Electronic Communications Privacy Act) or the courts. ...doi:10.24908/ss.v4i3.3448 fatcat:ta7eo4p3fbebvmtcdoph7e55c4
« Previous Showing results 1 — 15 out of 42,363 results