Results 21 to 30 of about 747,487 (289)
Obligations of trust for privacy and confidentiality in distributed transactions [PDF]
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions.
Anne Anderson +4 more
core +1 more source
Issues of privacy policy conflict in mobile social network
Privacy protection in mobile social networks is a hot issue in current research. Various privacy protection policies have been proposed. However, the conflict of privacy protection policies inevitably occurs.
Pingshui Wang, Qinjuan Ma
doaj +1 more source
Using privacy-protecting tools and reducing self-disclosure can decrease the likelihood of experiencing privacy violations. Whereas previous studies found people’s online self-disclosure being the result of privacy risk and benefit perceptions, the ...
Yannic Meier +2 more
doaj +1 more source
Examined Lives: Informational Privacy and the Subject as Object [PDF]
In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests.
Cohen, Julie E.
core +2 more sources
A Novel Location Privacy-Preserving Approach Based on Blockchain
Location-based services (LBS) bring convenience to people’s lives but are also accompanied with privacy leakages. To protect the privacy of LBS users, many location privacy protection algorithms were proposed.
Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen
doaj +1 more source
A Framework for Analyzing and Comparing Privacy States [PDF]
This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection.
Biava, Ryan, Rubel, Alan
core +1 more source
Survey of big-data-analysis-resistant privacy protection
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG +5 more
doaj +3 more sources
Privacy computing:concept, connotation and its research trend
s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever
Feng-hua LI +4 more
doaj +2 more sources
Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the ...
Zhe SUN, Hong NING, Lihua YIN, Binxing FANG
doaj +3 more sources
PLDP-FL: Federated Learning with Personalized Local Differential Privacy
As a popular machine learning method, federated learning (FL) can effectively solve the issues of data silos and data privacy. However, traditional federated learning schemes cannot provide sufficient privacy protection.
Xiaoying Shen +4 more
doaj +1 more source

