Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2008
Dealing with sensitive data has been the focus of much of recent research. On one hand data disclosure may incur some risk due to security breaches, but on the other hand data sharing has many advantages. For example, revealing customer transactions at a grocery store may be beneficial when studying purchasing patterns and market demand. However, a potential misuse of the revealed information may be harmful due to privacy violations. In this paper we study the tradeoff between data disclosure and data retention.
Risk-aware access control systems grant or deny access to resources based on the notion ofrisk. It has many advantages compared to classical approaches, allowing for more flexibility, and ultimately supporting for a better exploitation of data. We propose and demonstrate a risk-aware access control framework for information disclosure, which supports run-time risk assessment. In our framework access-control decisions are based on the disclosure-risk associated with a data access request and, differently from existing models, adaptive anonymization operations are used as risk-mitigation method. The inclusion of on-the-fly anonymization allows for extending access to data, still preserving privacy below the maximum tolerable risk. Risk thresholds can be adapted to the trustworthiness of the requester role, so a single access control framework can support multiple data access use cases, ranging from sharing data among a restricted (highly trusted) group to public release (low trust value). We have developed a prototype implementation of our framework and we have assessed it by running a number of queries against the Adult Data Set from the UCI Machine Learning Repository, a publicly available dataset that is widely used by the research community. The experimental results are encouraging and confirm the feasibility of the proposed approach.
Risk-aware access control systems grant or deny access to resources based on some notion of risk. In this paper we propose a model that considers the risk of leaking privacy-critical information when querying, e.g., datasets containing personal information. While querying databases containing personal information it is current practice to assign all-or-nothing access to avoid the disclosure of sensitive information. Using our model, access-control decisions are based on the disclosure-risk associated with a data access request and, differently from existing models, we include adaptive anonymization operations as risk-mitigation methods. By applying these operations, a request that would otherwise be rejected, is permitted after reducing the risk associated with the returned dataset.
International Journal of Engineering Research and Technology (IJERT)
IJERT-A Survival Study on Privacy Preservation of Data Sharing with Optimal Side Effects2015 •
https://www.ijert.org/a-survival-study-on-privacy-preservation-of-data-sharing-with-optimal-side-effects https://www.ijert.org/research/a-survival-study-on-privacy-preservation-of-data-sharing-with-optimal-side-effects-IJERTV4IS061036.pdf Privacy preserving is a significant task in the success delivery of the data to the users using data mining techniques. Privacy preserving data mining (PPDM) protects the individual sensitive data while sharing to the public users. PPDM was used to reduce privacy threats by hiding sensitive information while allowing required information to be mined from databases. Many existing PPDM techniques like data sanitization do not hide the sensitive information. The authenticity of original database using sensitive item hiding technique also alters the originality of the database in data sanitization techniques. In this work, association rule mining technique is used to send data to all the users with optimal side effects. Our research work helps to maintain the individual privacy for these sensitive attributes
2017 IEEE International Conference on Computer and Information Technology (CIT)
A New Approach to Utility-Based Privacy Preserving in Data Publishing2017 •
A fundamental problem in privacy-preserving data publishing is how to make the right trade-off between privacy risks and data utility. Anonymization techniques are used both to reduce privacy risks and to create anonymized dataset. The anonymized dataset can be grouped together into equivalence classes. The Equivalence Classes are classified into two groups based on the utility provided to the data recipients: Utility Equivalence Class (UEC) and Outlier Equivalence Class (OEC). The OEC contains records that have been fully suppressed by anonymization techniques resulting in no data utility. In this study, a new approach is proposed by reducing the number of outlier records in order to increase the data utility. In the proposed model, k-anonymity and l-diversity privacy models are used together to reduce the privacy risks. The Average Equivalence Class Size is used in measuring the data utility. According to the experimental results, the data utility is increased with the use of our ...
Lecture Notes in Computer Science
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk2006 •
Journal of Faculty of Education
الإعلام التربوي ومدى تطبيقه من قبل مديري مدارس كلية التربية بجامعة الخرطومهدف هذا البحث إلى التعرُّف على مستوى تطبيق مديري مدارس كليَّة التربيَّة بجامعة الخرطوم للإعلام التربوي من وجهة نظر المعلِّمين .وتم استخدام المنهج الوصفي، وبلغ حجم العينة (30) معلَّمأ ومعلَّمة، وتم استخدام الاستبانة التي تتكون من (20) فقرة مقسمة إلى محورين، هما: مجالات الإعلام التربوي، ووسائل الإعلام التربوي. وقد تم استخدام برنامج الحزمة الإحصائية للعلوم الاجتماعية SPSS لتحليل البيانات باستخدام المتوسطات والانحرافات المعيارية، واختبار مان_وتيني للفرق بين متوسطات الرتب المستقلة، إضافة إلى تحليل التباين الآحاديّ. و أظهرت النتائج أنَّ مستوى تطبيق مديري مدارس كليَّة التربيَّة بجامعة الخرطوم للإعلام التربوي من وجهة نظر المعلِّمين كان مرتفعاً، وذلك بمتوسط حسابي بلغ (3.73)، وعدم وجود فروق بين الذكور والإناث في مستوى تطبيق مديري مدارس كليَّة التربيَّة بجامعة الخرطوم للإعلام التربوي، وكذلك عدم وجود فروق في مستوى تطبيق مديري مدارس كليَّة التربيَّة بجامعة الخرطوم للإعلام التربوي وفقاً للمؤهل العلمي وسنوات الخبرة. وأوصى البحث بضرورة إجراء المزيد من الدراسات للتعرُّف على المعوقات التي تواجه تط...
La moral de las virtudes según santo Tomás de Aquino: Actualidad y pertinencia para la formación sacerdotal
Materiales Conferencia Monterrey2024 •
Cuadernos del Sur Filosofía
Tullia d’Aragona: una lectura feminista avant la lettre del neoplatonismo renacentista2023 •
Indian Scientific Journal Of Research In Engineering And Management
Red Teaming vs. Blue Teaming: A Comparative Analysis of CyberSecurity Strategies in the Digital Battlefield2023 •
Journal of Oceanography
Air-Sea Interaction, Coastal Circulation and Primary Production in the Eastern Arabian Sea: A Review2004 •
Sakarya tıp dergisi
Massive upper gastrointestinal bleeding due to giant splenic artery aneurysm with gastric fistula2013 •
Zeitschrift für Evidenz, Fortbildung und Qualität im Gesundheitswesen
Significant others’ experience of hospitalized patients’ transfer to home: A systematic review and meta-synthesis2018 •