The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy is an important issue that has raised particular concerns among many research areas. This issue dramatically increases with the proliferation of the Web services composition paradigm. This is mainly due to the high dynamism and untrustworthiness characteristics of the services to be composed, which impose high levels of risk on the interacting parties. Existing technologies for managing and...
Confidentiality of training data induced by releasing machine-learning models, and has recently received increasing attention. Motivated by existing MI attacks and other previous attacks that turn out to be MI "in disguise," this paper initiates a formal study of MI attacks by presenting a game-based methodology. Our methodology uncovers a number of subtle issues, and devising a rigorous...
Radio frequency identification (RFID) is a useful technology that has myriad applications in retail, manufacturing, and healthcare settings. RFID can scan devices in their proximity and report the data to information systems. RFID in healthcare settings presents potential security and privacy concerns to the people and processes being tracked by the devices -- particularly healthcare workers including...
Privacy threats are considered as very serious issues in Internet-based applications such as e-services since there are good opportunities to malicious attacks. Protecting the user from being observed when requesting an e-service is a fundamental right that any user should have. The unobservability is among the basic privacy properties. However, most of the existing privacy preserving techniques has...
Given the strategic value of social networking sites (SNSs), we investigate how the offer of a monetary reward (MR) in exchange for information can increase users' willingness to disclose, and thus help maintain stability of the SNS business model. We analyze results from a questionnaire administered to over 300 Chinese participants belonging to varying age, gender and occupational groups. Our results...
Data mining is gaining societal momentum due to the ever increasing availability of large amounts of human data, easily collected by a variety of sensing technologies. Data mining comes with unprecedented opportunities and risks: a deeper understanding of human behavior and how our society works is darkened by a greater chance of privacy intrusion and unfair discrimination based on the extracted patterns...
In last years, data mining has raised some concerns related to privacy invasion of the individuals and potential discrimination based on the extracted patterns and profiles. Efforts at fighting against these risks have led to developing privacy preserving data mining (PPDM) techniques and anti-discrimination techniques in data mining. However, there is an evident gap between the large body of research...
Information technology has attracted considerable attention in modern automobiles for their promise of value-added services. Based on increasing connectivity and seamless integration of advanced functionality into vehicles, a new challenge is the development of holistic and standardized privacy approaches. So far, privacy has often been considered as a singular task, neglecting the impact of a holistic...
Psychological reactions to privacy invasions are important to information sharing in online dyadic exchange. Although previous studies have enriched understanding on cognitive reaction to privacy invasions, rarely have researchers examined the emotional component. This study aims to fill the gap in the literature by examining the effects of cognitive and emotional reactions on information sharing...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new concerns that traditional privacy models for Web services do not handle. First, the distinction between the roles of service providers and data providers is unclear, leaving the latter helpless for specifying and verifying the enforcement of...
As privacy is becoming a salient issue for both organizations that provide digital services, as well as their users, access control shifts from traditional role-based models to more sophisticated paradigms that include additional provisions with respect to privacy. Complementing and particularizing our previous research work on the development of frameworks for the enforcement of privacy-aware access...
Collection and analysis of personal information is among the most far-reaching developments in online retail practices. While the potential value of harnessing data about people is expected to improve the online service offerings, it raises reasonable concerns about privacy. Rather than cutting off opportunities to make personal data available for enhancing online services, we introduce a model where...
We describe a new paradigm for articulating need-to-protect and need-to-share policies that shows promise for enabling automated derivation of the downgrading rulesets needed to comply with these policies in systems that share data. This new paradigm is based on fine-grained semantic policy specifications in terms of context, content, Purpose, and Anti-purpose that are expressed in a machine-understandable...
Electronic health record (EHR) systems are being introduced to overcome the limitations associated with paper-based and isolated electronic medical record (EMR) systems. This is accomplished by aggregating medical data and consolidating them in one digital repository. Though an EHR system provides obvious functional benefits, there is a growing concern about the privacy and reliability (trustworthiness)...
In sensor networks, privacy can be addressed in different levels of the network stack and at different points of the information flow. This paper presents an application level scheme for controlling information disclosure at the points of data capture. The scheme includes a trust model for facilitating in-network privacy decisions. The trust model exploits the pre-deployment knowledge on the network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.