28,323 Hits in 3.3 sec

Trust and Privacy in Knowledge Graphs [article]

Daniel Schwabe, Carlos Laufer
2019 arXiv   pre-print
This paper presents the KG Usage framework, which allows the introduction of KG features to support Trust, Privacy and Transparency concerns regarding the use of its contents by applications.  ...  A real-world example is presented and used to illustrate how the framework can be used.  ...  In order to be effective, we claim that the use of Knowledge Graphs must support these concerns -trust, privacy and transparency. In this paper we propose a framework that enables this support.  ... 
arXiv:1903.07673v1 fatcat:nlyqbcdfr5felebroxzw6gvdey

Knowledge Graphs: Trust, Privacy, and Transparency from a Legal Governance Approach

Daniel Schwabe, Carlos Laufer, Pompeu Casanovas
2020 Law in context (Bundoora, Vic.)  
This paper presents the Knowledge Graph Usage framework, which allows the introduction of Knowledge Graph features to support Trust, Privacy, Transparency and Accountability concerns regarding the use  ...  A real-world example is presented and used to illustrate how the framework can be used. This article also shows how knowledge graphs can be linked to the elements of legal governance.  ...  In order to be effective, we claim that the use of Knowledge Graphs ought to provide support for these concerns-trust, privacy and transparency.  ... 
doi:10.26826/law-in-context.v37i1.126 fatcat:3hkqair23naznou5pg7dqryscy

Preserving the Privacy of Sensitive Relationships in Graph Data [chapter]

Elena Zheleva, Lise Getoor
Privacy, Security, and Trust in KDD  
In this paper, we focus on the problem of preserving the privacy of sensitive relationships in graph data.  ...  We propose five different privacy preservation strategies, which vary in terms of the amount of data removed (and hence their utility) and the amount of privacy preserved.  ...  Link Re-identification Attacks The extent of a privacy breach is often determined by data domain knowledge of the adversary. The domain knowledge can influence accurate inference in subtle ways.  ... 
doi:10.1007/978-3-540-78478-4_9 dblp:conf/kdd/ZhelevaG07 fatcat:lermg5wytrfrfpsvrmznrzzdsy

Guest editorial: special issue on trust, privacy, and security in crowdsourcing computing

An Liu, Guanfeng Liu, Mehmet A. Orgun, Qing Li
2020 World wide web (Bussum)  
The human-centric and cooperationoriented feature of crowdsourcing prompts us to reexamine the trust, privacy, and security issues in this new paradigm since the individuals in the crowd typically are  ...  an atmosphere for funding new trust, privacy and security projects.  ...  In order to deal with this problem, the authors propose an ensemble strategy to enhance the robustness and trust of existing knowledge graph embedding approaches.  ... 
doi:10.1007/s11280-019-00772-z fatcat:sm4giziwtzetvdl6jtymhravyy

Trusted Compliance Enforcement Framework for Sharing Health Big Data

Dae-Young Kim, Lavanya Elluri, Karuna P. Joshi
2021 2021 IEEE International Conference on Big Data (Big Data)  
In paper [9] , authors developed a knowledge graph to describe COVID-related security and privacy rules, such as those specified in HIPAA.  ...  We included HIPAA, CDC contact tracing data elements, and trust ontology in the knowledge graph in this research.  ... 
doi:10.1109/bigdata52589.2021.9671834 fatcat:lxhf2elf7bfdrgpq75kodxtywy

Enforcing Privacy in Decentralized Mobile Social Networks

Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch
2014 Engineering Secure Software and Systems  
The paper then briefly reviews the state-of-the-art in privacy-preservation of social graphs and clarifies the lack of attention to graph sharing in decentralized setting.  ...  This position paper first summarizes work done by the first author on location privacy and differential privacy.  ...  Privacy Preservation of Social Graphs Social graphs considered in the state-of-the-art vary in a wide range, from unlabeled, simple, undirected ones to data-rich ones.  ... 
dblp:conf/essos/NguyenIR14 fatcat:zwxzsfwyy5d6pjpzlw5zl26o6u

Privacy-Aware Cloud Deployment Scenario Selection [chapter]

Kristian Beckers, Stephan Faßbender, Stefanos Gritzalis, Maritta Heisel, Christos Kalloniatis, Rene Meis
2014 Lecture Notes in Computer Science  
There are different deployment scenarios for clouds that heavily differ in the costs for deployment and maintenance, but also in the number of stakeholders involved in the cloud and the control over the  ...  The concept of clouds is integrated into the requirements model, which is used by ProPAn to automatically generate privacy threat graphs.  ...  Privacy threat graph for public cloud deployment graph generation algorithms automatically consider these diagrams and add respective information flow and access edges to the privacy graphs.  ... 
doi:10.1007/978-3-319-09770-1_9 fatcat:eaeqn5i3m5hzfhnqlymofyn2oa

A Privacy-Preserving Social P2P Infrastructure for People-Centric Sensing

Michael Dürr, Kevin Wiesner, Marc Herbstritt
2011 Networked Systems  
In this paper, we propose a protocol extension to our OSN design Vegas which enables secure, privacy-preserving, and trustful P2P communication between PCS participants.  ...  By securing knowledge about social links with standard public key cryptography, we achieve a degree of anonymity at a trust level which is almost good as that provided by a centralized trusted third party  ...  To the best of our knowledge, our approach is the first that uses an OSN to ensure privacy and trust in PCS networks.  ... 
doi:10.4230/oasics.kivs.2011.176 dblp:conf/kivs/DurrW11 fatcat:n2vjdvnh3rdnlo64zbi7iosa3u

Privacy-preserving function computation by exploitation of friendships in social networks

Farid M. Naini, Jayakrishnan Unnikrishnan, Patrick Thiran, Martin Vetterli
2014 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
We demonstrate that such trust relationships can be exploited to significantly improve the tradeoff between the privacy of users' data and the accuracy of the computation.  ...  We study the problem of privacy-preserving computation of functions of data that belong to users in a social network under the assumption that users are willing to share their private data with trusted  ...  Other privacy measures used in the literature include confidence intervals [3] , mutual information [13, 14] , priori and posteriori knowledge [15, 16] , game theory [17] , and cryptographic notions  ... 
doi:10.1109/icassp.2014.6854806 dblp:conf/icassp/NainiUTV14 fatcat:i6phga5hm5cutoktbhbhzqfb5u

TIKD: A Trusted Integrated Knowledge Dataspace For Sensitive Healthcare Data Sharing

Julio Hernandez, Lucy McKenna, Rob Brennan
2021 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)  
This paper presents the Trusted Integrated Knowledge Dataspace (TIKD), a new dataspace, based on linked data technologies and trusted data sharing, that supports integrated knowledge graphs for sensitive  ...  using a knowledge graph approach.  ...  knowledge graphs (KGs) in constructing a trusted data sharing environment.  ... 
doi:10.1109/compsac51774.2021.00280 fatcat:z3v7m72innbkfivbxropv2fzum

On-line trust perception: What really matters

Elisa Costante, Jerry den Hartog, Milan Petkovic
2011 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)  
We also demonstrate that the weight of certain factors is related to the users knowledge in the IT Security field.  ...  In this paper, we review the existing literature and provide a general trust perception model, which is able to measure the trustworthiness of a website.  ...  Privacy and reputation are still at the bottom of the list. A comparative graph, showing the factors' ranking differences amongst the domains we analyzed is presented in Figure 5 .  ... 
doi:10.1109/stast.2011.6059256 dblp:conf/stast/CostanteHP11 fatcat:iztj3eram5hjhbfcbledfpslwe

Privacy and security for online social networks: challenges and opportunities

Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang
2010 IEEE Network  
In this article we discuss the design issues for the security and privacy of OSNs.  ...  Online social networks such as Facebook, Myspace, and Twitter have experienced exponential growth in recent years.  ...  Conclusions In this article we have discussed the security and privacy design issues on online social networks and pointed out a few research directions for mitigating the design conflicts between the  ... 
doi:10.1109/mnet.2010.5510913 fatcat:lc6ymfjconh43l6zv2dcu7ahle


Imen Ben Dhia, Talel Abdessalem, Mauro Sozio
2012 Proceedings of the 21st ACM international conference on Information and knowledge management - CIKM '12  
In this demonstration proposal, we present Primates a privacy management system for social networks.  ...  The set of users who are allowed to access a given resource is defined by a set of constraints on the paths connecting the owner of a resource to its requester in the social graph.  ...  , based on available explicit access authoriza-tions and the underlying graph structure (i.e., communities), and, (ii) rule-based approaches as in [5] , which introduced trust and distance in the social  ... 
doi:10.1145/2396761.2398748 dblp:conf/cikm/DhiaAS12 fatcat:lplffmi55ne45agno2uogje2rq

Privacy and Cryptocurrencies - A Systematic Literature Review

Lasse Herskind, Panagiota Katsikouli, Nicola Dragoni
2020 IEEE Access  
This knowledge is powerful in the hands of those who have it, and can be used in multiple ways, not always to our benefit.  ...  Finally, we describe three research directions to enhance privacy for cryptocurrencies: transaction propagation mechanisms, succinct ZK proof systems without a trusted setup, and specialised trustless  ...  ZK proof systems without a trusted setup, and specialised trustless zero-knowledge proofs.  ... 
doi:10.1109/access.2020.2980950 fatcat:mv5atuumnvgljbn74fonh767be

Exploration and Optimization Of Friends' Connections In Social Networks

Kashif Nisar, Edith N. Ekwem
2014 Proceedings of the Asia-Pacific Advanced Network  
This paper discusses related work on social networks and method use in crawling online social network graph.  ...  Over the past few years, the rapid growth and the exponential use of social digital media has led to an increase in popularity of social networks and the emergence of social computing.  ...  In addition, there are many other policies used by social networking sites where privacy and trust of the user's may be violated.  ... 
doi:10.7125/apan.38.12 fatcat:due42rcxdff2jpmgvuoxeosoqu
« Previous Showing results 1 — 15 out of 28,323 results