Results 31 to 40 of about 2,873,813 (294)

Mandatory Enforcement of Privacy Policies using Trusted Computing Principles [PDF]

open access: yes, 2010
Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such
Dietzel, Stefan   +2 more
core   +3 more sources

Healthchain: A Privacy Protection System for Medical Data Based on Blockchain

open access: yesFuture Internet, 2021
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Ze-tao Li
semanticscholar   +1 more source

Privacy in (mobile) telecommunications services [PDF]

open access: yes, 2005
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den   +4 more
core   +1 more source

Issues of privacy policy conflict in mobile social network

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Privacy protection in mobile social networks is a hot issue in current research. Various privacy protection policies have been proposed. However, the conflict of privacy protection policies inevitably occurs.
Pingshui Wang, Qinjuan Ma
doaj   +1 more source

PLDP-FL: Federated Learning with Personalized Local Differential Privacy

open access: yesEntropy, 2023
As a popular machine learning method, federated learning (FL) can effectively solve the issues of data silos and data privacy. However, traditional federated learning schemes cannot provide sufficient privacy protection.
Xiaoying Shen   +4 more
doaj   +1 more source

AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud

open access: yesIEEE Access, 2020
Cloud is a computing model that provides sharing and supports ubiquitous on-demand access computing, providing new data processing and services for many industries, significantly reducing user computing and storage costs, and improving ease of use.
Caixia Yang   +5 more
semanticscholar   +1 more source

A Basic Framework for Privacy Protection in Personalized Information Retrieval: An Effective Framework for User Privacy Protection

open access: yesJournal of Organizational and End User Computing, 2021
Personalized information retrieval is an effective tool to solve the problem of information overload. Along with the rapid development of emerging network technologies such as cloud computing, however, network servers are becoming more and more untrusted,
Zongda Wu   +4 more
semanticscholar   +1 more source

Technology, privacy and identity: a Hong Kong perspective [PDF]

open access: yes, 2008
This article explores the concepts of privacy and identity in Hong Kong in relation to the law relating to data protection. It first considers the notions of privacy and identity in the light of Hong Kong's socioeconomic situation and recent postcolonial
Wong, R, Yap, JL
core   +1 more source

Survey of big-data-analysis-resistant privacy protection

open access: yes网络与信息安全学报, 2016
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
doaj   +3 more sources

A Novel Location Privacy-Preserving Approach Based on Blockchain

open access: yesSensors, 2020
Location-based services (LBS) bring convenience to people’s lives but are also accompanied with privacy leakages. To protect the privacy of LBS users, many location privacy protection algorithms were proposed.
Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen
doaj   +1 more source

Home - About - Disclaimer - Privacy