Filters








14,688 Hits in 4.3 sec

A Generic Scaffold Housing the Innovative Modus Operandi for Selection of the Superlative Anonymisation Technique for Optimized Privacy Preserving Data Mining [chapter]

J. Indumathi
2012 Data Mining Applications in Engineering and Medicine  
The Confidence Policy Evaluation first improves the quality of the data which will later be used for the privacy protection process.  ...  A greedy algorithm was implemented which dynamically incremented data confidence values in order to return query results that satisfied the stated confidence policies.  ... 
doi:10.5772/49982 fatcat:di63yjpsdbhwvg5vh2k6vny2ti

Compliance Using Metadata [chapter]

Rigo Wenning, Sabrina Kirrane
2018 Semantic Applications  
Query data and relevant metadata at the same time to only process data that has the right policy properties. 5.  ...  In the EU, the GDPR creates a framework with conditions (e.g. consent) for the processing of personal data.  ...  This could also be metadata about financial data or other data relevant for compliance with given policy information.  ... 
doi:10.1007/978-3-662-55433-3_3 fatcat:klpoxkgouvaibcrvhtjp7x6vfe

Automated Compliance of Mobile Wallet Payments for Cloud Services

Ankur Nagar, Lavanya Elluri, Karuna Pande Joshi
2021 2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)  
In this paper, we present our framework in detail along with the qualitative and quantitative measures that were used to validate the design against the policies of six major vendors that deal with mobile  ...  Mobile payments are on the rise, and as their popularity is emerging, providers must adhere to security regulations to ensure consumer confidence.  ...  ACKNOWLEDGMENT This work was supported in part by a DoD Supplement to NSF award 1747724, Phase I IUCRC UMBC: Center for Accelerated Real time Analytics (CARTA).  ... 
doi:10.1109/bigdatasecurityhpscids52275.2021.00018 fatcat:g3lnuzkm6za63n5wqzegzsim4e

Automated Detection of GDPR Disclosure Requirements in Privacy Policies using Deep Active Learning [article]

Tamjid Al Rahat, Tu Le, Yuan Tian
2021 arXiv   pre-print
We apply our model to perform a measurement on the compliance in the privacy policies.  ...  However, most privacy policies are verbose, full of jargon, and vaguely describe companies' data practices and users' rights. Therefore, it is unclear if they comply with GDPR.  ...  Then, we use margin sampling to select the instances (queries) that the model predicted with the least confidence.  ... 
arXiv:2111.04224v1 fatcat:gxvlykihzbb25fog7kmtcmfnre

Distribution Based Workload Modelling of Continuous Queries in Clouds

Alireza Khoshkbarforoushha, Rajiv Ranjan, Raj Gaire, Ehsan Abbasnejad, Lizhe Wang, Albert Y. Zomaya
2017 IEEE Transactions on Emerging Topics in Computing  
Such resource estimation for processing continuous queries over streaming data is challenging due to: (i) uncertain stream arrival patterns, (ii) need to process different mixes of queries, and (iii) varying  ...  Existing techniques approximate resource usage for a query as a single point value which may not be sufficient because it is neither expressive enough nor does it capture the aforementioned nature of streaming  ...  Unlike PDFs, with such estimation we are not able to directly calculate any valuable statistical measures (e.g. variance, confidence interval) about the target data.  ... 
doi:10.1109/tetc.2016.2597546 fatcat:mh4gm3zzlzbsvblburug3mgali

Adding value to customer engagement through effective data compliance

Marie Myles
2015 Journal of Direct Data and Digital Marketing Practice  
Permission to market is a vital resource for companies and one they need to nurture.  ...  Make your privacy policy visible to customersshout about what you are, and aren't, going to do with their data to build confidence and trust with your customers; 4.  ...  She blends customercentric, data-and insight-driven techniques with pragmatic, commercial thinking.  ... 
doi:10.1057/dddmp.2015.37 fatcat:rqjz4ayxnvfcpigugcl565mlxu

Purpose based access control for privacy protection in relational database systems

Ji-Won Byun, Ninghui Li
2006 The VLDB journal  
In the paper we also propose an approach to representing purpose information, which results in very low storage overhead, and we exploit query modification techniques to support data access control based  ...  Purpose information associated with a given data element specifies the intended use of the data element, and our model allows multiple purposes to be associated with each data element.  ...  Such techniques ensure efficient query processing even in the case of fine-grained purpose labeling.  ... 
doi:10.1007/s00778-006-0023-0 fatcat:pgqqpeq5lrfpbeinzkunroutkq

Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning [article]

Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer
2018 arXiv   pre-print
To address these hurdles, we propose an automated framework for privacy policy analysis (Polisis). It enables scalable, dynamic, and multi-dimensional queries on natural language privacy policies.  ...  The structured querying application is the automated assignment of privacy icons from privacy policies. With Polisis, we can achieve an accuracy of 88.4% on this task.  ...  Our findings are consistent with anecdotal controversies and manually investigated issues in privacy certification and compliance processes [19, 20, 21] .  ... 
arXiv:1802.02561v2 fatcat:klllbabgvncu5p3z77ko7yqp74

A Provenance-Based Policy Control Framework for Cloud Services [chapter]

Mufajjul Ali, Luc Moreau
2015 Lecture Notes in Computer Science  
The framework provides the necessary building blocks for integrating and developing services that are able to generate and use provenance data for provenance-based compliance control, which runs on a XACML  ...  This entails the nature of invocations that took place, how/where the data were created, modified, updated and the user's engagement with the service.  ...  The first author would like to thank Rafel Uddin, Kashif Chawdhry, Tansir Ahmed and other members of Orange Labs for their support.  ... 
doi:10.1007/978-3-319-16462-5_10 fatcat:x4cxcb6bmrbkjmr6kso4jtkr6y

D3.4 Transparency & Compliance Release

Wouter Dullaert, Uros Milosevic, Jonathan Langens, Arnaud S'Jongers, Nora Szepes, Vincent Goossens, Nathaniel Rudavsky-Brody, Ward Delabastita, Sabrina Kirrane, Javier D. Fernandez
2019 Zenodo  
It also offers an update over the previous release by reflecting on: ex ante compliance checking, consent backend changes, the personal data inventory, compression and encryption, and overall performance  ...  and Compliance Algorithms V2.  ...  As they process personal data, applications write the processing events to a processing log, which is then inspected for compliance. Ex ante compliance checking.  ... 
doi:10.5281/zenodo.4585893 fatcat:3ycbbtwugjbqjgkaebw4s6bcae

D3.4 Transparency & Compliance Framework V1.0

Wouter Dullaert, Uros Milosevic, Jonathan Langens, Arnaud S'Jongers, Nora Szepes, Vincent Goossens, Nathaniel Rudavsky-Brody, Ward Delabastita, Sabrina Kiranne, Javier Fernandez
2019 Zenodo  
As they process personal data, applications write the processing events to a processing log, which is then inspected for compliance. Ex ante compliance checking.  ...  Applications submit their requests for processing of personal data, which are then inspected for compliance.  ...  Optimizations with respect to data handling in in the compliance checker are expected to lead to significant improvements in terms of performance.  ... 
doi:10.5281/zenodo.2554205 fatcat:ifzcoxr6dvgx7p5hw4347jcmba

D3.6 Final Release

Uros Milosevic, Jonathan Langens
2019 Zenodo  
It also offers an update over the previous release by reflecting on: the transition from HermiT to the SPECIAL reasoner (Chapter 4), the support for processing full OWL policies (Chapter 4), Logstash,  ...  and Compliance Algorithms V2.  ...  As they process personal data, applications write the processing events to a processing log, which is then inspected for compliance. Ex ante compliance checking.  ... 
doi:10.5281/zenodo.4585947 fatcat:ysd3stjg7zhftg2e4checlv6om

The Privacy Policy Landscape After the GDPR

Thomas Linden, Rishabh Khandelwal, Hamza Harkous, Kassem Fawaz
2020 Proceedings on Privacy Enhancing Technologies  
Using this workflow, we show that privacy policies cover more data practices and are more consistent with seven compliance requirements post the GDPR.  ...  We gauge the complete consumption cycle of these policies, from the first user impressions until the compliance assessment.  ...  While the majority of policies in both sets scored full marks for each compliance query, the analysis revealed inconsistency between coverage and compliance.  ... 
doi:10.2478/popets-2020-0004 dblp:journals/popets/LindenKHF20 fatcat:az6hnasuy5giflbjwowmfwhwxy

The Privacy Policy Landscape After the GDPR [article]

Thomas Linden, Rishabh Khandelwal, Hamza Harkous, Kassem Fawaz
2019 arXiv   pre-print
Using this workflow, we show that privacy policies cover more data practices and are more consistent with seven compliance requirements post the GDPR.  ...  We gauge the complete consumption cycle of these policies, from the first user impressions until the compliance assessment.  ...  Availability We will make the corpus of the privacy policies along with the performed analyses public.  ... 
arXiv:1809.08396v3 fatcat:tfqegex2e5gddkwoxkod7567qa

Designing secure business processes with SecBPMN

Mattia Salnitri, Fabiano Dalpiaz, Paolo Giorgini
2015 Journal of Software and Systems Modeling  
Such interplay threatens the security of the overall system, and calls for verification techniques that enable determining compliance with security policies.  ...  for representing security policies; and (3) a query engine that enables checking SecBPMN-Q policies against SecBPMN-ml specifications.  ...  compliance verification, i.e., query languages for business processes (Section 7.3) and verification techniques that employ formal languages (Section 7.4).  ... 
doi:10.1007/s10270-015-0499-4 fatcat:justzyrmorh77bcojbrferxtsm
« Previous Showing results 1 — 15 out of 14,688 results