Results 51 to 60 of about 1,487,229 (359)

Privacy-Preserving Process Mining in Healthcare [PDF]

open access: yesInternational Journal of Environmental Research and Public Health, 2020
Process mining has been successfully applied in the healthcare domain and has helped to uncover various insights for improving healthcare processes. While the benefits of process mining are widely acknowledged, many people rightfully have concerns about irresponsible uses of personal data.
Stephanus Budiono   +7 more
openaire   +7 more sources

Privacy-Preserving Bin-Packing With Differential Privacy

open access: yesIEEE Open Journal of Signal Processing, 2022
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service.
Tianyu Li   +2 more
doaj   +1 more source

Privacy-preserving email forensics

open access: yesDigital Investigation, 2015
AbstractIn many digital forensic investigations, email data needs to be analyzed. However, this poses a threat to the privacy of the individual whose emails are being examined and in particular becomes a problem if the investigation clashes with privacy laws.
Armknecht, Frederik, Dewald, Andreas
openaire   +3 more sources

Privacy-Preserving Set Operations [PDF]

open access: yes, 2005
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private input multiset. In order to protect these private sets, the players perform privacy-preserving computation; that is, no party learns more information about other parties’ private
Dawn Song, Lea Kissner
openaire   +3 more sources

Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption

open access: yesIEEE Access, 2018
Considering the openness and cross-domains of cloud computing, the traditional privacy-preserving technology cannot be applied in cloud computing efficiently.
Hongbing Cheng   +3 more
doaj   +1 more source

Deconvoluting kernel density estimation and regression for locally differentially private data

open access: yesScientific Reports, 2020
Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner.
Farhad Farokhi
doaj   +1 more source

A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, in which sensor nodes are apt to encounter some serious leakage of sensitive data.
Changlun Zhang, Chao Li, Yi Zhao
doaj   +1 more source

Privacy Preserving Multidimensional Profiling

open access: yes, 2018
Recently, big data had become central in the analysis of human behavior and the development of innovative services. In particular, a new class of services is emerging, taking advantage of different sources of data, in order to consider the multiple aspects of human beings.
Fosca Giannotti   +4 more
openaire   +4 more sources

User-centric distributed solutions for privacy-preserving analytics [PDF]

open access: yes, 2017
How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?
Bestavros, Azer   +2 more
core   +1 more source

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

Home - About - Disclaimer - Privacy