Results 331 to 340 of about 11,267,119 (387)
Some of the next articles are maybe not open access.

Privacy, additional information and communication

IEEE Transactions on Information Theory, 1993
Summary: Two parties, each holding one input of a two-variable function, communicate in order to determine the value of the function. Each party wants to expose as little of its input as possible to the other party. We prove tight bounds on the minimum amount of information about the individual inputs that must be revealed in the computation of most ...
Bar-Yehuda, Reuven   +3 more
openaire   +1 more source

Information privacy?!

Computer Networks, 2012
When using the Internet, we reveal much personal information both willingly and indadvertedly. Companies use this information for targeted advertisement and thereby to finance the services they offer to users. The mechanisms used today to protect users' personal information are lacking resulting in far too frequent privacy and security breaches that ...
openaire   +1 more source

Information and Privacy

2000
Abstract Sir David Williams has influenced public law for many years. From an early stage in his career, he took the subject seriously enough to subject it to rigorous analysis. This convinced many that the law of civil liberties was more than a more or less random collection of interferences with freedoms.
openaire   +1 more source

Health Information Privacy Reform

Journal of Occupational and Environmental Medicine, 1995
Statutory protection for personal health information privacy is in clear need of reform. With few exceptions, current legal safeguards provide uneven coverage and limited protection. Absence of a uniform federal code of fair health information practices leaves individual rights in health information compromised, exposes data users, and poses a ...
S O, Cassidy, M J, Sepulveda
openaire   +2 more sources

Market Philosophy and Information Privacy

Javnost - The Public, 2011
AbstractThis article examines U.S. policy shaping of personal information flow in its historical trajectory. The analysis newly draws on the notion of the marketplace ideal in privacy debate and analyses a regulatory continuum that an online information protection regime is the product of active formulation of a policy principle.
openaire   +2 more sources

Security and Privacy Challenges of Large Language Models: A Survey

ACM Computing Surveys
Large language models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering.
B. Das, M. H. Amini, Yanzhao Wu
semanticscholar   +1 more source

On Protecting the Data Privacy of Large Language Models (LLMs): A Survey

International Conference on Mathematics and Computing
Large language models (LLMs) are complex artificial intelligence systems capable of understanding, generating and translating human language. They learn language patterns by analyzing large amounts of text data, allowing them to perform writing ...
Biwei Yan   +6 more
semanticscholar   +1 more source

Genetic Information Privacy and Discrimination

The Health Care Manager, 2001
As rapidly evolving technologies provide more information about disease-related genes in human DNA, there is an increase in genetic screening for predisposition for a variety of diseases. Knowledge of genetic information provides significant benefits and drawbacks.
openaire   +2 more sources

Informational Privacy

2010
Abstract This article looks at the issues of informational privacy or data privacy. It discusses the problems brought about by the arrival of cybertechnology, which created many business opportunities but threatened personal privacy. It proposes a definition for information privacy and suggests that the restricted access/limited control ...
openaire   +1 more source

Medical information, confidentiality, and privacy

Hematology/Oncology Clinics of North America, 2002
State laws and accreditation requirements dictate the form, ownership, and substance of medical records, as well as requirements for storage, access, and confidentiality. There are limited exceptions to these requirements but they are highly circumscribed. Federal law also outlines requirements to ensure the privacy of patient-identifiable information.
openaire   +2 more sources

Home - About - Disclaimer - Privacy