Results 51 to 60 of about 941,166 (211)
Privacy and Security Best Practices for IoT Solutions
The rapid increase in Internet of Things (IoT) applications has raised security and privacy issues due to the huge amount of data acquired by IoT devices and transmitted through the Internet.
Matteo Anedda+7 more
doaj +1 more source
Privacy Games: Optimal User-Centric Data Obfuscation
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core +2 more sources
Interrogating the relationship between copyright enforcement and privacy raises deeper questions about the nature of privacy and what counts, or ought to count, as privacy invasion in the age of networked digital technologies.
Cohen, Julie E.
core +2 more sources
PharmaLedger: Blockchain-Enabled Healthcare: Privacy-Enhancement with Blockchain
Topics such as supply chain, clinical trials and health data will be explored along with how blockchian can exist in harmony with GDPR.
Halid Kayhan, Co-lead for Regulatory, Legal and Data Privacy Framework, PharmaLedger
doaj +1 more source
Design of Privacy-Preserving Dynamic Controllers [PDF]
As a quantitative criterion for privacy of "mechanisms" in the form of data-generating processes, the concept of differential privacy was first proposed in computer science and has later been applied to linear dynamical systems. However, differential privacy has not been studied in depth together with other properties of dynamical systems, and it has ...
Yu Kawano, Ming Cao
openaire +2 more sources
Truthful Linear Regression [PDF]
We consider the problem of fitting a linear model to data held by individuals who are concerned about their privacy. Incentivizing most players to truthfully report their data to the analyst constrains our design to mechanisms that provide a privacy ...
Cummings, Rachel+2 more
core +3 more sources
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel+3 more
core +2 more sources
Home robots will cause privacy harms. At the same time, they can provide beneficial services—as long as consumers trust them. This Essay evaluates potential technological solutions that could help home robots keep their promises, avert their eyes, and ...
Grimm, Cindy M.+3 more
core +2 more sources
PriPeARL: A Framework for Privacy-Preserving Analytics and Reporting at LinkedIn
Preserving privacy of users is a key requirement of web-scale analytics and reporting applications, and has witnessed a renewed focus in light of recent data breaches and new regulations such as GDPR. We focus on the problem of computing robust, reliable
Aggarwal G.+3 more
core +1 more source
The awareness of Privacy issues in Ambient Intelligence
Ambient Intelligence (AmI) involves extensive and invisible integration of computer technologies in people´s daily lives: Smart Sensors, Smart Phones, Tablets, Wireless Sensor Network (Wi-Fi, Bluetooth, NFC, RFID, etc.), Internet (Facebook, WhatsApp ...
Mar LÓPEZ+3 more
doaj +1 more source