Results 11 to 20 of about 1,768,773 (316)
This position paper observes how different technical and normative conceptions of privacy have evolved in parallel and describes the practical challenges that these divergent approaches pose. Notably, past technologies relied on intuitive, heuristic understandings of privacy that have since been shown not to satisfy expectations for privacy protection.
Kobbi Nissim, Alexandra Wood
openaire +4 more sources
The longer version of the journal paper accepted for publication in IEEE Journal of Selected Areas in Information Theory (JSAIT)
B. Rassouli, D. Gunduz
openaire +8 more sources
A Framework for Analyzing and Comparing Privacy States [PDF]
This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection.
Biava, Ryan, Rubel, Alan
core +1 more source
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive information. Its origin is in statistics with the goal to ensure the confidentiality of data gathered from census and questionnaires. The topic was latter introduced in computer science and more particularly in data mining, where due to the large amount of data ...
Vicenç Torra, Guillermo Navarro-Arribas
openaire +6 more sources
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds [PDF]
"Concentrated differential privacy" was recently introduced by Dwork and Rothblum as a relaxation of differential privacy, which permits sharper analyses of many privacy-preserving computations.
A Beimel+7 more
core +2 more sources
Transparent Privacy is Principled Privacy
In a technical treatment, this article establishes the necessity of transparent privacy for drawing unbiased statistical inference for a wide range of scientific questions. Transparency is a distinct feature enjoyed by differential privacy: the probabilistic mechanism with which the data are privatized can be made public without sabotaging the privacy ...
openaire +3 more sources
Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives
Empirical attacks on Federated Learning (FL) systems indicate that FL is fraught with numerous attack surfaces throughout the FL execution. These attacks can not only cause models to fail in specific tasks, but also infer private information.
Pengrui Liu, Xiangrui Xu, Wei Wang
doaj +1 more source
Privacy and Coordination: Computing on Databases with Endogenous Participation [PDF]
We propose a simple model where individuals in a privacy-sensitive population decide whether or not to participate in a pre-announced noisy computation by an analyst, so that the database itself is endogenously determined by individuals ...
Ghosh, Arpita, Ligett, Katrina
core +2 more sources
This contribution provides a short introduction into the conceptual and socio-technical development of privacy. It identifies central issues that inform and structure current debates as well as transformations of privacy spurred by digital technology. In particular, it highlights central ambivalences of privacy between protection and de-politicization ...
Matzner, Tobias, Ochs, Carsten
openaire +3 more sources
Jurisprudential and Legal Study of the Relationship between Surrogate Mother and the Child Born of Surrogacy [PDF]
Using surrogacy as one of the new ways of supporting fertility in away that the owner of the womb (surrogate mother) does not have anycreational relationship (through ovum) with the child, merely raisingthe fetus of another couple and giving birth to it,
Najadali Almasi+2 more
doaj +1 more source