Search results for "Privacy preserving"

showing 6 items of 6 documents

Constraints validation in privacy-preserving attribute-based access control

2015

Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.

Information privacyAuthenticationComputer access controlComputer sciencebusiness.industryContext (language use)Access controlSecurity policyComputer securitycomputer.software_genrePrivacy preservingNISTbusinesscomputer2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

A novel scheme for privacy preserving in RBAC

2013

Role Based Access Control (RBAC) Model has been proved to be quite useful and has drawn a lot of research interest over the last fifteen years. In this paper we discuss general context-aware RBAC model. We analyze potential privacy threats associated with use of context-aware RBAC and propose a novel scheme that provides privacy-preserving for access models based on RBAC.

Privacy preservingScheme (programming language)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSInformation privacySoftware_OPERATINGSYSTEMSComputer scienceAuthorizationRole-based access controlComputer securitycomputer.software_genrecomputercomputer.programming_language2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)
researchProduct

Privacy preserving via tree augmented naïve Bayesian classifier in multimedia database

2011

International audience; In this paper, we propose a novel technique for privacy preserving in multimedia databases. Our technique is based on a multimedia co-occurrence matrix and a tree augmented naive Bayesian classifier (TAN) to detect possible data associations making confidential multimedia objects at risk.

Novel technique[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer scienceMultimedia database[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genre[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB][ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Naive bayesian classifier[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Privacy preservingTree (data structure)[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Data miningcomputerProceedings of the International Conference on Management of Emergent Digital EcoSystems
researchProduct

Rings for privacy: An architecture for privacy-preserving user profiling

2014

Information privacysocial networking (online) data privacy human factors InternetSettore ING-INF/03 - TelecomunicazioniComputer sciencePrivacy softwarebusiness.industryInternet privacyComputer securitycomputer.software_genrePrivacy preservingprivacy-preserving users profiling FCM clustering distributed unstable scenarioProfiling (information science)The InternetArchitecturebusinesscomputer
researchProduct

Discovering Homophily in Online Social Networks

2018

During the last ten years, Online Social Networks (OSNs) have increased their popularity by becoming part of the real life of users. Despite their tremendous widespread, OSNs have introduced several privacy issues as a consequence of the nature of the information involved in these services. Indeed, the huge amount of private information produced by users of current OSNs expose the users to a number of risks. The analysis of the users’ similarity in OSNs is attracting the attention of researchers because of its implications on privacy and social marketing. In particular, the homophily between users could be used to reveal important characteristics that users would like to keep hidden, hence …

Viral marketingComputer scienceComputer Networks and CommunicationsInternet privacy02 engineering and technologyInformation SystemHomophilyHomophilyViral marketing020204 information systemsSimilarity (psychology)0202 electrical engineering electronic engineering information engineeringInformation systemPrivate information retrievalOnline Social NetworkOnline Social Networksbusiness.industryPopularitySocial marketingTie strengthPrivacy preservingHardware and ArchitectureHomophily; Online Social Networks; Privacy preserving; User profiling; Viral marketing; Software; Information Systems; Hardware and Architecture; Computer Networks and Communications020201 artificial intelligence & image processingUser profilingbusinessSoftwareInformation Systems
researchProduct

THE IMAGE PROTECTOR A Flexible Security Rule Specification Toolkit

2011

International audience; The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model's related information and multimedia objects data. To specify s…

[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Multimedia Security[SCCO.COMP] Cognitive science/Computer science[ SCCO.COMP ] Cognitive science/Computer science[SCCO.COMP]Cognitive science/Computer scienceContent ProtectionPrivacy Preserving Security Rules[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Security RulesPrivacy Preserving[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct