• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 828
Next 10 →

Transforming Data to Satisfy Privacy Constraints

by Vijay S. Iyengar , 2002
"... Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can also contain other kinds of personal information (e.g., date of birth, zip code, gender) that are potentially identifying ..."
Abstract - Cited by 250 (0 self) - Add to MetaCart
of generalizations and suppressions on the potentially identifying portions of the data. We extend earlier works in this area along various dimensions. First, satisfying privacy constraints is considered in conjunction with the usage for the data being disseminated. This allows us to optimize the process

Privacy constraints in regularized convex optimization

by Kamalika Chaudhuri, Anand D. Sarwate , 2009
"... Privacy concerns are becoming more important as more personal data moves online. It is therefore of interest to develop versions of data-processing algorithms which can be guaranteed to preserve the privacy of individuals ’ data. A general method for creating a privacy-preserving version of a convex ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Privacy concerns are becoming more important as more personal data moves online. It is therefore of interest to develop versions of data-processing algorithms which can be guaranteed to preserve the privacy of individuals ’ data. A general method for creating a privacy-preserving version of a

Validate Privacy Constraints in Surveillance Systems

by László Havasi, Zoltán Szlávik, Levente Kovács, Ákos Utasi, Csaba Benedek, Tamás Szirányi
"... Abstract. The paper introduces a video surveillance and event detection framework and application for semi-supervised surveillance use. The system development follows the guidelines of national strategy for surveillance systems. The aim is to generalize the interoperability, compatibility and legali ..."
Abstract - Add to MetaCart
Abstract. The paper introduces a video surveillance and event detection framework and application for semi-supervised surveillance use. The system development follows the guidelines of national strategy for surveillance systems. The aim is to generalize the interoperability, compatibility and legality in camera surveillance systems in Hungary. The system’s intended use is in automatic mode on camera feeds that are not actively watched by surveillance personnel, and should raise alarms when unusual events occur. We present the current detector filters, and the extendable modular interface. Filters include local and global unusual motion detectors, left/stolen object detector, motion detector, tampering/failure detector, etc. It has been tested in real life situation for police street surveillance.

TANDEM DISTRIBUTED BAYESIAN DETECTIONWITH PRIVACY CONSTRAINTS

by Zuxing Li, Tobias J. Oechtering
"... In this paper, the privacy problem of a tandem distributed detection system vulnerable to an eavesdropper is proposed and studied in the Bayesian formulation. The privacy risk is evaluated by the detection cost of the eavesdropper which is assumed to be informed and greedy. For the sensors whose ope ..."
Abstract - Add to MetaCart
operations are constrained to suppress the privacy risk, it is shown that the optimal detection strategies are likelihood-ratio tests. This fundamental insight allows for the opti-mization to reuse known algorithms extended to incorporate the privacy constraint. The trade-off between the detection

Adding privacy constraints to video-based applications

by A. Cavallaro - European Workshop on the Integration of Knowledge, Semantics and Digital Media Technology , 2004
"... Remote accessibility to video cameras, face recognition software, and searchable image and video databases enable automated video surveillance. The same technologies and features enabling advanced functionalities facilitate as well the misuse of a surveillance system and can lead to the infringement ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
of privacy constraints. The proposed framework is composed of two levels of semantic segmentation and subsequent description. The first level extracts video objects whereas the second extracts parts of a scene that can identify an individual, such as faces and license plates. The rationale behind

A Software Product Line Approach for Handling Privacy Constraints in Web Personalization

by Yang Wang, Alfred Kobsa - In: PEP05, UM05 Workshop on Privacy-Enhanced Personalization , 2005
"... Abstract. Web personalization has demonstrated to be advantageous for both online customers and vendors. However, its benefits are severely counteracted by privacy concerns. Personalized systems need to take these into account, as well as privacy laws and industry self-regulations that may be in eff ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
be in effect. When these constraints are present, they not only affect the personal data that can be collected, but also the methods that can be used to process the data. The present research aims at maximizing the personalization benefits, while at the same time satisfying the currently prevailing privacy

Respecting Users' Individual Privacy Constraints in Web Personalization

by Yang Wang, Alfred Kobsa - In proceedings of the UM07, 11th International Conference on User Modeling , 2007
"... Abstract. Web personalization has demonstrated to be advantageous for both online customers and vendors. However, its benefits may be severely counteracted by privacy constraints. Personalized systems need to take users ’ privacy concerns into account, as well as privacy laws and industry self-regul ..."
Abstract - Cited by 11 (4 self) - Add to MetaCart
Abstract. Web personalization has demonstrated to be advantageous for both online customers and vendors. However, its benefits may be severely counteracted by privacy constraints. Personalized systems need to take users ’ privacy concerns into account, as well as privacy laws and industry self

Generalized privacy amplification

by Charles H. Bennett, Gilles Brassard, Claude Crkpeau, Ueli M. Maurer, Senior Member - IEEE Transactions on Information Theory , 1995
"... Abstract- This paper provides a general treatment of pri-vacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about which ..."
Abstract - Cited by 325 (19 self) - Add to MetaCart
Abstract- This paper provides a general treatment of pri-vacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about

Supporting Network Formation through Mining under Privacy Constraints

by Florian Skopik, Daniel Schall, Schahram Dustdar
"... Abstract—Single professionals and small companies come together and form virtual communities to compete with global players. In these collaboration networks, the actual business partners are discovered and alliances formed on demand. However, it is impossible for single members to keep track of the ..."
Abstract - Add to MetaCart
of social relations, such as the degree of trust based on the success of past interactions, are a powerful means to support the formation of alliances. However, by applying monitoring, also privacy concerns arise. In this paper we deal with concepts and tools to support group formations. We consider

1Enabling Data Exchange in Interactive State Estimation under Privacy Constraints

by E. V. Belmega, L. Sankar, H. V. Poor
"... Abstract—Data collecting agents in large networks, such as the electric power system, need to share information (measurements) for estimating the system state in a distributed manner. However, privacy concerns may limit or prevent this exchange leading to a tradeoff between state estimation fidelity ..."
Abstract - Add to MetaCart
Abstract—Data collecting agents in large networks, such as the electric power system, need to share information (measurements) for estimating the system state in a distributed manner. However, privacy concerns may limit or prevent this exchange leading to a tradeoff between state estimation
Next 10 →
Results 1 - 10 of 828
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University