The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy-preserving distributed machine learning becomes increasingly important due to the recent rapid growth of data. This paper focuses on a class of regularized empirical risk minimization machine learning problems, and develops two methods to provide differential privacy to distributed learning algorithms over a network. We first decentralize the learning algorithm using the alternating direction...
Supported by maturing information and communication technology (ICT) technologies, the medical care industry entered its digitization age. However, medical information is highly confidential and involves privacy; even legitimate access can cause privacy infringements. Under the current medical administration system, no established application systems conform to the IRB (Institutional review board)...
Many companies have to share various types of information containing private data without being aware about the threats related to such non-controlled disclosure. Therefore we propose a solution to support these companies to evaluate the disclosure risk for all their types of data; by recommending the safest configurations using a smart bootstrapping system.
In this paper, we present an end-user tool called the privacy protection framework (P2F) which aims to support users in protecting their privacy when obtaining Web-based services. P2F acts as a recommendation tool that analyzes the user's transaction history and privacy preferences in addition to real-world privacy guidelines to prevent undesirable disclosure of personal data. The framework is based...
This paper introduces the concepts of e-commerce privacy, security risk of e-commerce privacy, and present status of security risk of e-commerce privacy, analyzes the causes of security risks of e-commerce privacy in six aspects: humanity, environment, infrastructure, logical entities, security mechanisms, security services and applications, and gives the corresponding preventive strategies for e-commerce...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.