Results 51 to 60 of about 1,487,229 (359)
Privacy-Preserving Process Mining in Healthcare [PDF]
Process mining has been successfully applied in the healthcare domain and has helped to uncover various insights for improving healthcare processes. While the benefits of process mining are widely acknowledged, many people rightfully have concerns about irresponsible uses of personal data.
Stephanus Budiono+7 more
openaire +7 more sources
Privacy-Preserving Bin-Packing With Differential Privacy
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service.
Tianyu Li+2 more
doaj +1 more source
Privacy-preserving email forensics
AbstractIn many digital forensic investigations, email data needs to be analyzed. However, this poses a threat to the privacy of the individual whose emails are being examined and in particular becomes a problem if the investigation clashes with privacy laws.
Armknecht, Frederik, Dewald, Andreas
openaire +3 more sources
Privacy-Preserving Set Operations [PDF]
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private input multiset. In order to protect these private sets, the players perform privacy-preserving computation; that is, no party learns more information about other parties’ private
Dawn Song, Lea Kissner
openaire +3 more sources
Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption
Considering the openness and cross-domains of cloud computing, the traditional privacy-preserving technology cannot be applied in cloud computing efficiently.
Hongbing Cheng+3 more
doaj +1 more source
Deconvoluting kernel density estimation and regression for locally differentially private data
Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner.
Farhad Farokhi
doaj +1 more source
A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, in which sensor nodes are apt to encounter some serious leakage of sensitive data.
Changlun Zhang, Chao Li, Yi Zhao
doaj +1 more source
Privacy Preserving Multidimensional Profiling
Recently, big data had become central in the analysis of human behavior and the development of innovative services. In particular, a new class of services is emerging, taking advantage of different sources of data, in order to consider the multiple aspects of human beings.
Fosca Giannotti+4 more
openaire +4 more sources
User-centric distributed solutions for privacy-preserving analytics [PDF]
How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?
Bestavros, Azer+2 more
core +1 more source
Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core +2 more sources