Results 31 to 40 of about 2,873,813 (294)
Mandatory Enforcement of Privacy Policies using Trusted Computing Principles [PDF]
Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such
Dietzel, Stefan+2 more
core +3 more sources
Healthchain: A Privacy Protection System for Medical Data Based on Blockchain
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Ze-tao Li
semanticscholar +1 more source
Privacy in (mobile) telecommunications services [PDF]
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den+4 more
core +1 more source
Issues of privacy policy conflict in mobile social network
Privacy protection in mobile social networks is a hot issue in current research. Various privacy protection policies have been proposed. However, the conflict of privacy protection policies inevitably occurs.
Pingshui Wang, Qinjuan Ma
doaj +1 more source
PLDP-FL: Federated Learning with Personalized Local Differential Privacy
As a popular machine learning method, federated learning (FL) can effectively solve the issues of data silos and data privacy. However, traditional federated learning schemes cannot provide sufficient privacy protection.
Xiaoying Shen+4 more
doaj +1 more source
AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud
Cloud is a computing model that provides sharing and supports ubiquitous on-demand access computing, providing new data processing and services for many industries, significantly reducing user computing and storage costs, and improving ease of use.
Caixia Yang+5 more
semanticscholar +1 more source
Personalized information retrieval is an effective tool to solve the problem of information overload. Along with the rapid development of emerging network technologies such as cloud computing, however, network servers are becoming more and more untrusted,
Zongda Wu+4 more
semanticscholar +1 more source
Technology, privacy and identity: a Hong Kong perspective [PDF]
This article explores the concepts of privacy and identity in Hong Kong in relation to the law relating to data protection. It first considers the notions of privacy and identity in the light of Hong Kong's socioeconomic situation and recent postcolonial
Wong, R, Yap, JL
core +1 more source
Survey of big-data-analysis-resistant privacy protection
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
doaj +3 more sources
A Novel Location Privacy-Preserving Approach Based on Blockchain
Location-based services (LBS) bring convenience to people’s lives but are also accompanied with privacy leakages. To protect the privacy of LBS users, many location privacy protection algorithms were proposed.
Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen
doaj +1 more source