Showing 11 - 20 of 9,458
Identity federation systems enable participating organizations to provide services to qualified individuals and manage … their identity attributes at an inter-organizational level. Most importantly, they empower individuals with control over the … important yet immature one is the privacy policy. Existing frameworks proposed for privacy-preserving federations lack the …
Persistent link: https://www.econbiz.de/10009430847
is represented by automated trust negotiation systems. Trust negotiation systems allow subjects in different security … represent a threat to privacy in that credentials, exchanged during negotiations, often contain sensitive personal information … that may need to be selectively released. In this paper, we address the problem of preserving privacy in trust negotiations …
Persistent link: https://www.econbiz.de/10009430311
sufficient privacy. We propose an alternative design centered on differential privacy, a novel paradigm that provides strong … record pairs, reducing the matching cost to acceptable levels. The blocking step is essential for the privacy, accuracy and … privacy guarantees. The realization of the new model presents difficult challenges, such as the evaluation of distance …
Persistent link: https://www.econbiz.de/10009430495
privacy and disclosure rules. While the work on privacy languages and enforcement mechanisms, such as Hippocratic databases …, has advanced our understanding of designing privacy-preserving policies for healthcare databases, the need to integrate … requirement for (i) integration of privacy and disclosure policies with well-known healthcare standards used in the industry in …
Persistent link: https://www.econbiz.de/10009483165
As sensor networks are being increasingly deployed in decision-making infrastructures such as battlefield monitoring systems and SCADA (Supervisory Control and Data Acquisition) systems, making decision makers aware of the trustworthiness of the collected data is a crucial. To address this...
Persistent link: https://www.econbiz.de/10009430286
This paper proposes a novel approach for privacy-preserving distributed model-based classifier training. Our approach … is an important step towards supporting customizable privacy modeling and protection. It consists of three major steps … models that are shared from multiple data sites. To reduce the data transmission costs and the potential privacy breaches …
Persistent link: https://www.econbiz.de/10009430289
The first Workshop on Security and Privacy in GIS and LBS (SPRINGL 2008) was organized on November 4, 2008 at Irvine … security and privacy. Both security and privacy are critical for geospatial applications because of the dramatic increase and … (relational) data in particular. The discussion at the workshop spanned across security and privacy aspects, as they relate to the …
Persistent link: https://www.econbiz.de/10009430290
compliance with its associated privacy definitions. Previous work in Hippocratic databases has proposed the design of some of …Privacy preservation has become an important requirement in information systems that deal with personal data. In many … privacy requirement; they extend the architecture of standard DBMSs with components that ensure personal data is handled in …
Persistent link: https://www.econbiz.de/10009430509
have several essential security and privacy properties. We present a basic yet reasonably expressive language which … architecture and prototype implementation of VeryIDX, based on several important design considerations of a real-world e …
Persistent link: https://www.econbiz.de/10009430551
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de/10009430552