A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Trust and Privacy in Knowledge Graphs
[article]
2019
arXiv
pre-print
This paper presents the KG Usage framework, which allows the introduction of KG features to support Trust, Privacy and Transparency concerns regarding the use of its contents by applications. ...
A real-world example is presented and used to illustrate how the framework can be used. ...
In order to be effective, we claim that the use of Knowledge Graphs must support these concerns -trust, privacy and transparency. In this paper we propose a framework that enables this support. ...
arXiv:1903.07673v1
fatcat:nlyqbcdfr5felebroxzw6gvdey
Knowledge Graphs: Trust, Privacy, and Transparency from a Legal Governance Approach
2020
Law in context (Bundoora, Vic.)
This paper presents the Knowledge Graph Usage framework, which allows the introduction of Knowledge Graph features to support Trust, Privacy, Transparency and Accountability concerns regarding the use ...
A real-world example is presented and used to illustrate how the framework can be used. This article also shows how knowledge graphs can be linked to the elements of legal governance. ...
In order to be effective, we claim that the use of Knowledge Graphs ought to provide support for these concerns-trust, privacy and transparency. ...
doi:10.26826/law-in-context.v37i1.126
fatcat:3hkqair23naznou5pg7dqryscy
Preserving the Privacy of Sensitive Relationships in Graph Data
[chapter]
Privacy, Security, and Trust in KDD
In this paper, we focus on the problem of preserving the privacy of sensitive relationships in graph data. ...
We propose five different privacy preservation strategies, which vary in terms of the amount of data removed (and hence their utility) and the amount of privacy preserved. ...
Link Re-identification Attacks The extent of a privacy breach is often determined by data domain knowledge of the adversary. The domain knowledge can influence accurate inference in subtle ways. ...
doi:10.1007/978-3-540-78478-4_9
dblp:conf/kdd/ZhelevaG07
fatcat:lermg5wytrfrfpsvrmznrzzdsy
Guest editorial: special issue on trust, privacy, and security in crowdsourcing computing
2020
World wide web (Bussum)
The human-centric and cooperationoriented feature of crowdsourcing prompts us to reexamine the trust, privacy, and security issues in this new paradigm since the individuals in the crowd typically are ...
an atmosphere for funding new trust, privacy and security projects. ...
In order to deal with this problem, the authors propose an ensemble strategy to enhance the robustness and trust of existing knowledge graph embedding approaches. ...
doi:10.1007/s11280-019-00772-z
fatcat:sm4giziwtzetvdl6jtymhravyy
Trusted Compliance Enforcement Framework for Sharing Health Big Data
2021
2021 IEEE International Conference on Big Data (Big Data)
In paper [9] , authors developed a knowledge graph to describe COVID-related security and privacy rules, such as those specified in HIPAA. ...
We included HIPAA, CDC contact tracing data elements, and trust ontology in the knowledge graph in this research. ...
doi:10.1109/bigdata52589.2021.9671834
fatcat:lxhf2elf7bfdrgpq75kodxtywy
Enforcing Privacy in Decentralized Mobile Social Networks
2014
Engineering Secure Software and Systems
The paper then briefly reviews the state-of-the-art in privacy-preservation of social graphs and clarifies the lack of attention to graph sharing in decentralized setting. ...
This position paper first summarizes work done by the first author on location privacy and differential privacy. ...
Privacy Preservation of Social Graphs Social graphs considered in the state-of-the-art vary in a wide range, from unlabeled, simple, undirected ones to data-rich ones. ...
dblp:conf/essos/NguyenIR14
fatcat:zwxzsfwyy5d6pjpzlw5zl26o6u
Privacy-Aware Cloud Deployment Scenario Selection
[chapter]
2014
Lecture Notes in Computer Science
There are different deployment scenarios for clouds that heavily differ in the costs for deployment and maintenance, but also in the number of stakeholders involved in the cloud and the control over the ...
The concept of clouds is integrated into the requirements model, which is used by ProPAn to automatically generate privacy threat graphs. ...
Privacy threat graph for public cloud deployment graph generation algorithms automatically consider these diagrams and add respective information flow and access edges to the privacy graphs. ...
doi:10.1007/978-3-319-09770-1_9
fatcat:eaeqn5i3m5hzfhnqlymofyn2oa
A Privacy-Preserving Social P2P Infrastructure for People-Centric Sensing
2011
Networked Systems
In this paper, we propose a protocol extension to our OSN design Vegas which enables secure, privacy-preserving, and trustful P2P communication between PCS participants. ...
By securing knowledge about social links with standard public key cryptography, we achieve a degree of anonymity at a trust level which is almost good as that provided by a centralized trusted third party ...
To the best of our knowledge, our approach is the first that uses an OSN to ensure privacy and trust in PCS networks. ...
doi:10.4230/oasics.kivs.2011.176
dblp:conf/kivs/DurrW11
fatcat:n2vjdvnh3rdnlo64zbi7iosa3u
Privacy-preserving function computation by exploitation of friendships in social networks
2014
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
We demonstrate that such trust relationships can be exploited to significantly improve the tradeoff between the privacy of users' data and the accuracy of the computation. ...
We study the problem of privacy-preserving computation of functions of data that belong to users in a social network under the assumption that users are willing to share their private data with trusted ...
Other privacy measures used in the literature include confidence intervals [3] , mutual information [13, 14] , priori and posteriori knowledge [15, 16] , game theory [17] , and cryptographic notions ...
doi:10.1109/icassp.2014.6854806
dblp:conf/icassp/NainiUTV14
fatcat:i6phga5hm5cutoktbhbhzqfb5u
TIKD: A Trusted Integrated Knowledge Dataspace For Sensitive Healthcare Data Sharing
2021
2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)
This paper presents the Trusted Integrated Knowledge Dataspace (TIKD), a new dataspace, based on linked data technologies and trusted data sharing, that supports integrated knowledge graphs for sensitive ...
using a knowledge graph approach. ...
knowledge graphs (KGs) in constructing a trusted data sharing environment. ...
doi:10.1109/compsac51774.2021.00280
fatcat:z3v7m72innbkfivbxropv2fzum
On-line trust perception: What really matters
2011
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)
We also demonstrate that the weight of certain factors is related to the users knowledge in the IT Security field. ...
In this paper, we review the existing literature and provide a general trust perception model, which is able to measure the trustworthiness of a website. ...
Privacy and reputation are still at the bottom of the list. A comparative graph, showing the factors' ranking differences amongst the domains we analyzed is presented in Figure 5 . ...
doi:10.1109/stast.2011.6059256
dblp:conf/stast/CostanteHP11
fatcat:iztj3eram5hjhbfcbledfpslwe
Privacy and security for online social networks: challenges and opportunities
2010
IEEE Network
In this article we discuss the design issues for the security and privacy of OSNs. ...
Online social networks such as Facebook, Myspace, and Twitter have experienced exponential growth in recent years. ...
Conclusions In this article we have discussed the security and privacy design issues on online social networks and pointed out a few research directions for mitigating the design conflicts between the ...
doi:10.1109/mnet.2010.5510913
fatcat:lc6ymfjconh43l6zv2dcu7ahle
Primates
2012
Proceedings of the 21st ACM international conference on Information and knowledge management - CIKM '12
In this demonstration proposal, we present Primates a privacy management system for social networks. ...
The set of users who are allowed to access a given resource is defined by a set of constraints on the paths connecting the owner of a resource to its requester in the social graph. ...
, based on available explicit access authoriza-tions and the underlying graph structure (i.e., communities), and, (ii) rule-based approaches as in [5] , which introduced trust and distance in the social ...
doi:10.1145/2396761.2398748
dblp:conf/cikm/DhiaAS12
fatcat:lplffmi55ne45agno2uogje2rq
Privacy and Cryptocurrencies - A Systematic Literature Review
2020
IEEE Access
This knowledge is powerful in the hands of those who have it, and can be used in multiple ways, not always to our benefit. ...
Finally, we describe three research directions to enhance privacy for cryptocurrencies: transaction propagation mechanisms, succinct ZK proof systems without a trusted setup, and specialised trustless ...
ZK proof systems without a trusted setup, and specialised trustless zero-knowledge proofs. ...
doi:10.1109/access.2020.2980950
fatcat:mv5atuumnvgljbn74fonh767be
Exploration and Optimization Of Friends' Connections In Social Networks
2014
Proceedings of the Asia-Pacific Advanced Network
This paper discusses related work on social networks and method use in crawling online social network graph. ...
Over the past few years, the rapid growth and the exponential use of social digital media has led to an increase in popularity of social networks and the emergence of social computing. ...
In addition, there are many other policies used by social networking sites where privacy and trust of the user's may be violated. ...
doi:10.7125/apan.38.12
fatcat:due42rcxdff2jpmgvuoxeosoqu
« Previous
Showing results 1 — 15 out of 28,323 results