Trust but Pre-Verify?
نویسنده
چکیده
Governments should be uncompromising in jointly seeking both information and privacy goals for the data that is in their stewardship. The GAO’s 2001 report on Record Linkage and Privacy places a combined high priority on information gains and privacy issues–and presents this position in contrast to an alternative “zero-sum approach” that conceptualizes privacy and information mainly, or only in terms of, trade-offs. The 2001 GAO report further indicates that the way to achieve a combined high priority (for both information gains and privacy issues) is through an improved “privacy-protection tool box” to insure linkages that preserve privacy:
منابع مشابه
Trust, -- but Verify! Emergence, Trust and Quality in Intelligent Systems
Trust, --but Verify!, a well known political dictum was enunciated by the late Ronald Reagan (United States President, 1980-88) in his attempts to break down barriers and integrate the communist (political, economic and nuclear) systems into a capitalist world. Nowhere is this dictum more appropriate than in the context of attempts to enable information integration and service composition for c...
متن کاملBare - Handed Electronic Voting with Pre - processing Submitted as a partial fulfillment of the requirements towards
Many electronic voting protocols assume the voter votes with some computing device. This raises the question whether a voter can trust the device he is using. Three years ago, Chaum, and independently Neff, proposed what we call bare-handed electronic voting, where voters do not need any computational power in the voting booth. Their protocols have a strong unforgeability guarantee. The price f...
متن کاملAdvancing Trust Negotiations for Collaborative Tasks
Sharing sensitive information across security domains is an important requirement for knowledge intensive collaborative work, but such sharing may impose risks on security and privacy integrity. Research has increasingly recognized the role of trust in minimizing the risk of information sharing across untrusted or unknown entities. To this extent, trust negotiations[1][3][15][20] have emerged a...
متن کاملTowards a Trust Envisioned Cyber Security
Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. Trust can also be established via a third party. But can we kn...
متن کاملNegotiated Privacy: (Extended Abstract)
Exponential growth in digital information gathering, storage, and processing capabilities inexorably leads to conflict between wellintentioned government or commercial datamining, and fundamental privacy interests of individuals and organizations. This paper proposes a mechanism that provides cryptographic fetters on the mining of personal data, enabling efficient mining of previously-negotiate...
متن کامل