4 Hits in 10.7 sec

Quantifying the Re-identification Risk of Event Logs for Process Mining [chapter]

Saskia Nuñez von Voigt, Stephan A. Fahrenkrog-Petersen, Dominik Janssen, Agnes Koschmider, Florian Tschorsch, Felix Mannhardt, Olaf Landsiedel, Matthias Weidlich
2020 Lecture Notes in Computer Science  
In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs.  ...  We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered.  ...  We thank Yves-Alexandre de Montjoye for providing his code to estimate data uniqueness, which we used in our evaluation.  ... 
doi:10.1007/978-3-030-49435-3_16 fatcat:vp5ndlwhm5c7rgxcoszdvyfdui

Proceedings of the British Thoracic Society

1993 Thorax  
All of the men were followed up to the time of their departure from mine service, relapse, or 20 December 1992 by the routine mine radiological surveillance for tuberculosis and by a central tuberculosis  ...  identification.  ...  Sedation for fibreoptic bronchoscopy has recognised risks and the benefit of the active drug in this study may not be sufficient to justify its use.  ... 
doi:10.1136/thx.48.10.1052 fatcat:72y2odlae5gwzly5hpvmisghay

Differential Privacy: An Exploration of the Privacy-Utility Landscape Differential Privacy: An Exploration of the Privacy-Utility Landscape

Darakhshan Mir, Darakhshan Mir
2013 unpublished
Facilitating use of sensitive data for research or commercial purposes, in a manner that preserves the privacy of participating entities, is an active area of study.  ...  In this dissertation, I examine the often conflicting goals of privacy and utility within the framework of differential privacy.  ...  by the empiricial risk of a predictor.  ... 

Physically informed runtime verification for cyber physical systems [article]

Xi Zheng
I evaluate the tool-set with increasingly complex real CPS applications of smart agent systems. vi  ...  Cyber-physical systems (CPS) are an integration of computation with physical processes.  ...  Dustminer [101] collects system logs to look for sequences of events responsible for faulty interactions among sensors.  ... 
doi:10.15781/t2nk5q fatcat:jfjxim7vdndmhdfyj2jjym5rwu