How Is Positive-Sum Privacy Feasible?
نویسندگان
چکیده
This work discusses Ann Cavoukian's fourth Privacy by Design (PbD) principle, which is known as Full Functionality PositiveSum, not Zero-Sum. The authors argue that this principle regulating trade-o s between privacy and functionality is questionable from a theoretic as well as from an operational point of view. A more consistent and pragmatic de nition of positive-sum privacy is proposed and demonstrated using an example scenario in the context of video surveillance.
منابع مشابه
Privacy Spatial and Temporal Distances in Nomadic Settelments
Human always in interaction with their social environment, have consider some degree of privacy with different purposes, for themselves, the people around them and carry out their activities. Creating privacy depends on two elements; subjective meanings that ruling the creation of privacy, and the second sentence are person available facilities. Privacy is not seen, heard, smelled and availabil...
متن کاملپروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملPrivacy-Preserving Aggregation of Time-Series Data
We consider how an untrusted data aggregator can learn desired statistics over multiple participants’ data, without compromising each individual’s privacy. We propose a construction that allows a group of participants to periodically upload encrypted values to a data aggregator, such that the aggregator is able to compute the sum of all participants’ values in every time period, but is unable t...
متن کاملPrivacy-Preserving Data Mining Algorithm Quantum Ant Colony Optimization
Bayesian network has been used extensively in data mining. The Privacy-Preserving data mining algorithm based on quantum ant colony optimization is proposed in this paper. The algorithm is based on distributed database. The algorithm is divided into two steps. In the first step, the modified quantum ant colony optimization algorithm is used to get the local Bayesian network structure. The purpo...
متن کاملThe Tension between Transparency and Confidentiality in International Arbitrations
The present research study intends to investigate the concepts of transparency, confidentiality and privacy within the scope of Investor-State Arbitration and International Commercial Arbitration.Transparency, confidentiality and privacy are the main pillars of international arbitration which have a close relationship together, however in some cases they are in a controversial situation. The te...
متن کامل