Search results for "Privacy preserving"
showing 6 items of 6 documents
Constraints validation in privacy-preserving attribute-based access control
2015
Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.
A novel scheme for privacy preserving in RBAC
2013
Role Based Access Control (RBAC) Model has been proved to be quite useful and has drawn a lot of research interest over the last fifteen years. In this paper we discuss general context-aware RBAC model. We analyze potential privacy threats associated with use of context-aware RBAC and propose a novel scheme that provides privacy-preserving for access models based on RBAC.
Privacy preserving via tree augmented naïve Bayesian classifier in multimedia database
2011
International audience; In this paper, we propose a novel technique for privacy preserving in multimedia databases. Our technique is based on a multimedia co-occurrence matrix and a tree augmented naive Bayesian classifier (TAN) to detect possible data associations making confidential multimedia objects at risk.
Rings for privacy: An architecture for privacy-preserving user profiling
2014
Discovering Homophily in Online Social Networks
2018
During the last ten years, Online Social Networks (OSNs) have increased their popularity by becoming part of the real life of users. Despite their tremendous widespread, OSNs have introduced several privacy issues as a consequence of the nature of the information involved in these services. Indeed, the huge amount of private information produced by users of current OSNs expose the users to a number of risks. The analysis of the users’ similarity in OSNs is attracting the attention of researchers because of its implications on privacy and social marketing. In particular, the homophily between users could be used to reveal important characteristics that users would like to keep hidden, hence …
THE IMAGE PROTECTOR A Flexible Security Rule Specification Toolkit
2011
International audience; The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model's related information and multimedia objects data. To specify s…