نتایج جستجو برای: phan privacy model
تعداد نتایج: 2140719 فیلتر نتایج به سال:
Recently an attack on ballot privacy in Helios has been discovered [20], which is essentially based on copying other voter’s votes. To capture this and similar attacks, we extend the classical threat model and introduce a new security notion for voting protocols: Vote-Independence. We give a formal definition and analyze its relationship to established privacy properties such as Vote-Privacy, R...
Title of Dissertation: Privacy Preserving Distributed Data Mining based on Multi-objective Optimization and Algorithmic Game Theory Kamalika Das, Doctor of Philosophy, 2009 Thesis directed by: Dr. Hillol Kargupta Professor Department of Computer Science and Electrical Engineering Use of technology for data collection and analysis has seen an unprecedented growth in the last couple of decades. I...
It is well understood that processing personal data without effective data management models may lead to privacy violations. Such concerns have motivated the development of privacy-preserving systems and legal frameworks such as the EU General Data Protection Regulation. However, there is a disconnect between policy-makers and engineers with respect to the meaning of privacy. In addition, it is...
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in four building blocks. The privacy regulation analysis identifies and structures the applicable regulations. The management reference model enables an enterprise to define and enforce an enterprise privacy strategy and th...
The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...
A large number of products are now being sold with long-term warranty policies. This is mainly due to fierce competition in the market and customer demand. Offering long term warranty results in additional complexities in estimating costs associated with warranty servicing due to the uncertainties associated with usage, preventive maintenance and warranty servicing strategies. This paper review...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید