Results 21 to 30 of about 747,487 (289)

Obligations of trust for privacy and confidentiality in distributed transactions [PDF]

open access: yes, 2009
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions.
Anne Anderson   +4 more
core   +1 more source

Issues of privacy policy conflict in mobile social network

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Privacy protection in mobile social networks is a hot issue in current research. Various privacy protection policies have been proposed. However, the conflict of privacy protection policies inevitably occurs.
Pingshui Wang, Qinjuan Ma
doaj   +1 more source

Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites

open access: yesStudies in Communication, Media, 2021
Using privacy-protecting tools and reducing self-disclosure can decrease the likelihood of experiencing privacy violations. Whereas previous studies found people’s online self-disclosure being the result of privacy risk and benefit perceptions, the ...
Yannic Meier   +2 more
doaj   +1 more source

Examined Lives: Informational Privacy and the Subject as Object [PDF]

open access: yes, 2000
In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests.
Cohen, Julie E.
core   +2 more sources

A Novel Location Privacy-Preserving Approach Based on Blockchain

open access: yesSensors, 2020
Location-based services (LBS) bring convenience to people’s lives but are also accompanied with privacy leakages. To protect the privacy of LBS users, many location privacy protection algorithms were proposed.
Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen
doaj   +1 more source

A Framework for Analyzing and Comparing Privacy States [PDF]

open access: yes, 2014
This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection.
Biava, Ryan, Rubel, Alan
core   +1 more source

Survey of big-data-analysis-resistant privacy protection

open access: yes网络与信息安全学报, 2016
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG   +5 more
doaj   +3 more sources

Privacy computing:concept, connotation and its research trend

open access: yesTongxin xuebao, 2016
s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever
Feng-hua LI   +4 more
doaj   +2 more sources

Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range

open access: yes网络与信息安全学报, 2023
Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the ...
Zhe SUN, Hong NING, Lihua YIN, Binxing FANG
doaj   +3 more sources

PLDP-FL: Federated Learning with Personalized Local Differential Privacy

open access: yesEntropy, 2023
As a popular machine learning method, federated learning (FL) can effectively solve the issues of data silos and data privacy. However, traditional federated learning schemes cannot provide sufficient privacy protection.
Xiaoying Shen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy