Academic literature on the topic 'Data privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data privacy"
Yerbulatov, Sultan. "Data Security and Privacy in Data Engineering." International Journal of Science and Research (IJSR) 13, no. 4 (April 5, 2024): 232–36. http://dx.doi.org/10.21275/es24318121241.
Full textTorra, Vicenç, and Guillermo Navarro-Arribas. "Data privacy." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 4, no. 4 (June 2, 2014): 269–80. http://dx.doi.org/10.1002/widm.1129.
Full textBasha, M. John, T. Satyanarayana Murthy, A. S. Valarmathy, Ahmed Radie Abbas, Djuraeva Gavhar, R. Rajavarman, and N. Parkunam. "Privacy-Preserving Data Mining and Analytics in Big Data." E3S Web of Conferences 399 (2023): 04033. http://dx.doi.org/10.1051/e3sconf/202339904033.
Full textCOSTEA, Ioan. "Data Privacy Assurance in Virtual Private Networks." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 40–47. http://dx.doi.org/10.19107/ijisc.2012.02.05.
Full textMohapatra, Shubhankar, Jianqiao Zong, Florian Kerschbaum, and Xi He. "Differentially Private Data Generation with Missing Data." Proceedings of the VLDB Endowment 17, no. 8 (April 2024): 2022–35. http://dx.doi.org/10.14778/3659437.3659455.
Full textSramka, Michal. "Data mining as a tool in privacy-preserving data publishing." Tatra Mountains Mathematical Publications 45, no. 1 (December 1, 2010): 151–59. http://dx.doi.org/10.2478/v10127-010-0011-z.
Full textHeubl, B. "News - Briefing. Data privacy: Data privacy group found to have breached online privacy rules." Engineering & Technology 15, no. 3 (April 1, 2020): 9. http://dx.doi.org/10.1049/et.2020.0317.
Full textJAKŠIĆ, SVETLANA, JOVANKA PANTOVIĆ, and SILVIA GHILEZAN. "Linked data privacy." Mathematical Structures in Computer Science 27, no. 1 (March 18, 2015): 33–53. http://dx.doi.org/10.1017/s096012951500002x.
Full textWinarsih, Winarsih, and Irwansyah Irwansyah. "PROTEKSI PRIVASI BIG DATA DALAM MEDIA SOSIAL." Jurnal Audience 3, no. 1 (October 19, 2020): 1–33. http://dx.doi.org/10.33633/ja.v3i1.3722.
Full textSmith, J. H., and JS Horne. "Data privacy and DNA data." IASSIST Quarterly 47, no. 3-4 (December 14, 2023): 1–3. http://dx.doi.org/10.29173/iq1094.
Full textDissertations / Theses on the topic "Data privacy"
Zhang, Nan. "Privacy-preserving data mining." [College Station, Tex. : Texas A&M University, 2006. http://hdl.handle.net/1969.1/ETD-TAMU-1080.
Full textNguyen, Benjamin. "Privacy-Centric Data Management." Habilitation à diriger des recherches, Université de Versailles-Saint Quentin en Yvelines, 2013. http://tel.archives-ouvertes.fr/tel-00936130.
Full textLin, Zhenmin. "Privacy Preserving Distributed Data Mining." UKnowledge, 2012. http://uknowledge.uky.edu/cs_etds/9.
Full textAron, Yotam. "Information privacy for linked data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85215.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 77-79).
As data mining over massive amounts of linked data becomes more and more prevalent in research applications, information privacy becomes a more important issue. This is especially true in the biological and medical fields, where information sensitivity is high. Previous experience has shown that simple anonymization techniques, such as removing an individual's name from a data set, are inadequate to fully protect the data's participants. While strong privacy guarantees have been studied for relational databases, these are virtually non-existent for graph-structured linked data. This line of research is important, however, since the aggregation of data across different web sources may lead to privacy leaks. The ontological structure of linked data especially aids these attacks on privacy. The purpose of this thesis is two-fold. The first is to investigate differential privacy, a strong privacy guarantee, and how to construct differentially-private mechanisms for linked data. The second involves the design and implementation of the SPARQL Privacy Insurance Module (SPIM). Using a combination of well-studied techniques, such as authentication and access control, and the mechanisms developed to maintain differential privacy over linked data, it attempts to limit privacy hazards for SPARQL queries. By using these privacy-preservation techniques, data owners may be more willing to share their data sets with other researchers without the fear that it will be misused. Consequently, we can expect greater sharing of information, which will foster collaboration and improve the types of data that researchers can have access to.
by Yotam Aron.
M. Eng.
Jawad, Mohamed. "Data privacy in P2P Systems." Nantes, 2011. http://www.theses.fr/2011NANT2020.
Full textOnline peer-to-peer (P2P) communities such as professional ones (e. G. , medical or research communities) are becoming popular due to increasing needs on data sharing. P2P environments offer valuable characteristics but limited guarantees when sharing sensitive data. They can be considered as hostile because data can be accessed by everyone (by potentially malicious peers) and used for everything (e. G. , for marketing or for activities against the owner’s preferences or ethics). This thesis proposes a privacy service that allows sharing sensitive data in P2P systems while protecting their privacy. The first contribution consists on analyzing existing techniques for data privacy in P2P architectures. The second contribution is a privacy model for P2P systems named PriMod which allows data owners to specify their privacy preferences in privacy policies and to associate them with their data. The third contribution is the development of PriServ, a privacy service located on top of DHT-based P2P systems which implements PriMod to prevent data privacy violations. Among others, PriServ uses trust techniques to predict peers behavior
Foresti, S. "Preserving privacy in data outsourcing." Doctoral thesis, Università degli Studi di Milano, 2010. http://hdl.handle.net/2434/156360.
Full textLivraga, G. "PRESERVING PRIVACY IN DATA RELEASE." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233324.
Full textLoukides, Grigorios. "Data utility and privacy protection in data publishing." Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/54743/.
Full textSobati, Moghadam Somayeh. "Contributions to Data Privacy in Cloud Data Warehouses." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE2020.
Full textNowadays, data outsourcing scenarios are ever more common with the advent of cloud computing. Cloud computing appeals businesses and organizations because of a wide variety of benefits such as cost savings and service benefits. Moreover, cloud computing provides higher availability, scalability, and more effective disaster recovery rather than in-house operations. One of the most notable cloud outsourcing services is database outsourcing (Database-as-a-Service), where individuals and organizations outsource data storage and management to a Cloud Service Provider (CSP). Naturally, such services allow storing a data warehouse (DW) on a remote, untrusted CSP and running on-line analytical processing (OLAP).Although cloud data outsourcing induces many benefits, it also brings out security and in particular privacy concerns. A typical solution to preserve data privacy is encrypting data locally before sending them to an external server. Secure database management systems use various encryption schemes, but they either induce computational and storage overhead or reveal some information about data, which jeopardizes privacy.In this thesis, we propose a new secure secret splitting scheme (S4) inspired by Shamir’s secret sharing. S4 implements an additive homomorphic scheme, i.e., additions can be directly computed over encrypted data. S4 addresses the shortcomings of existing approaches by reducing storage and computational overhead while still enforcing a reasonable level of privacy. S4 is efficient both in terms of storage and computing, which is ideal for data outsourcing scenarios that consider the user has limited computation and storage resources. Experimental results confirm the efficiency of S4 in terms of computation and storage overhead with respect to existing solutions.Moreover, we also present new order-preserving schemes, order-preserving indexing (OPI) and wrap-around order-preserving indexing (waOPI), which are practical on cloud outsourced DWs. We focus on the problem of performing range and exact match queries over encrypted data. In contrast to existing solutions, our schemes prevent performing statistical and frequency analysis by an adversary. While providing data privacy, the proposed schemes bear good performance and lead to minimal change for existing software
Ma, Jianjie. "Learning from perturbed data for privacy-preserving data mining." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Summer2006/j%5Fma%5F080406.pdf.
Full textBooks on the topic "Data privacy"
Xu, Lei, Chunxiao Jiang, Yi Qian, and Yong Ren. Data Privacy Games. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77965-2.
Full textPorter, Kathleen M., and Peter M. Moldave. Data use & privacy. Boston, MA: MCLE New England, 2015.
Find full textWest, Tobi, and Aeron Zentner. Data Privacy and Governance. 2455 Teller Road, Thousand Oaks California 91320: SAGE Publications, Inc., 2021. http://dx.doi.org/10.4135/9781071859414.
Full textWong, Raymond Chi-Wing, and Ada Wai-Chee Fu. Privacy-Preserving Data Publishing. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-01834-3.
Full textGkoulalas-Divanis, Aris, and Grigorios Loukides, eds. Medical Data Privacy Handbook. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23633-9.
Full textSalomon, David. Data Privacy and Security. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9.
Full textMakulilo, Alex B., ed. African Data Privacy Laws. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47317-8.
Full textAggarwal, Charu C., and Philip S. Yu, eds. Privacy-Preserving Data Mining. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-70992-5.
Full textTorra, Vicenç. Guide to Data Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12837-0.
Full textSouth African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.
Find full textBook chapters on the topic "Data privacy"
Gardner, Anthony Luzzatto. "Data Privacy." In Stars with Stripes, 149–89. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29966-8_5.
Full textTorra, Vicenç, Guillermo Navarro-Arribas, and Klara Stokes. "Data Privacy." In Studies in Big Data, 121–32. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97556-6_7.
Full textFleckenstein, Mike, and Lorraine Fellows. "Data Privacy." In Modern Data Strategy, 143–63. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-68993-7_14.
Full textAgrawal, Rakesh. "Data Privacy." In Machine Learning: ECML 2004, 8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30115-8_2.
Full textAgrawal, Rakesh. "Data Privacy." In Lecture Notes in Computer Science, 8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30116-5_2.
Full textBezzi, Michele, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Stefano Paraboschi, and Pierangela Samarati. "Data Privacy." In Privacy and Identity Management for Life, 157–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20317-6_8.
Full textReid, Rob. "Data Privacy." In Practical CockroachDB, 123–38. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8224-3_6.
Full textShukla, Samiksha, Jossy P. George, Kapil Tiwari, and Joseph Varghese Kureethara. "Data Privacy." In Data Ethics and Challenges, 17–39. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0752-4_2.
Full textKulesza, Joanna. "Privacy." In Encyclopedia of Big Data, 766–72. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-32010-6_172.
Full textKulesza, Joanna. "Privacy." In Encyclopedia of Big Data, 1–6. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-32001-4_172-1.
Full textConference papers on the topic "Data privacy"
Chathoth, Ajesh Koyatan, Clark P. Necciai, Abhyuday Jagannatha, and Stephen Lee. "Differentially Private Federated Continual Learning with Heterogeneous Cohort Privacy." In 2022 IEEE International Conference on Big Data (Big Data). IEEE, 2022. http://dx.doi.org/10.1109/bigdata55660.2022.10021082.
Full textSrinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Full textChaves, Iago, and Javam Machado. "Differentially Private Group-by Data Releasing Algorithm." In XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.
Full textJung, Kangsoo, and Seog Park. "Privacy Bargaining with Fairness: Privacy-Price Negotiation System for Applying Differential Privacy in Data Market Environments." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006101.
Full textTakagi, Shun, Fumiyuki Kato, Yang Cao, and Masatoshi Yoshikawa. "Asymmetric Differential Privacy." In 2022 IEEE International Conference on Big Data (Big Data). IEEE, 2022. http://dx.doi.org/10.1109/bigdata55660.2022.10020709.
Full textZhong, Haoti, Hao Li, Anna Squicciarini, Sarah Rajtmajer, and David Miller. "Toward Image Privacy Classification and Spatial Attribution of Private Content." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006510.
Full textUshiyama, Shojiro, Tsubasa Takahashi, Masashi Kudo, and Hayato Yamana. "Homomorphic Encryption-Friendly Privacy-Preserving Partitioning Algorithm for Differential Privacy." In 2022 IEEE International Conference on Big Data (Big Data). IEEE, 2022. http://dx.doi.org/10.1109/bigdata55660.2022.10020699.
Full textHuai, Mengdi, Di Wang, Chenglin Miao, Jinhui Xu, and Aidong Zhang. "Privacy-aware Synthesizing for Crowdsourced Data." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/353.
Full textAnant, Aaloka, and Ramjee Prasad. "Public Private Data Partnerships enabling Privacy Technologies." In 2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE, 2022. http://dx.doi.org/10.1109/wpmc55625.2022.10014859.
Full textDu, Leilei, Peng Cheng, Libin Zheng, Wei Xi, Xuemin Lin, Wenjie Zhang, and Jing Fang. "Dynamic Private Task Assignment under Differential Privacy." In 2023 IEEE 39th International Conference on Data Engineering (ICDE). IEEE, 2023. http://dx.doi.org/10.1109/icde55515.2023.00210.
Full textReports on the topic "Data privacy"
Liu, Zhuang, Michael Sockin, and Wei Xiong. Data Privacy and Temptation. Cambridge, MA: National Bureau of Economic Research, August 2020. http://dx.doi.org/10.3386/w27653.
Full textZhan, Zhijun, and LiWu Chang. Privacy-Preserving Collaborative Data Mining. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada464602.
Full textHeffetz, Ori, and Katrina Ligett. Privacy and Data-Based Research. Cambridge, MA: National Bureau of Economic Research, September 2013. http://dx.doi.org/10.3386/w19433.
Full textLiu, Zhuang, Michael Sockin, and Wei Xiong. Data Privacy and Algorithmic Inequality. Cambridge, MA: National Bureau of Economic Research, May 2023. http://dx.doi.org/10.3386/w31250.
Full textRiyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.
Full textEsponda, Fernando, Stephanie Forrest, and Paul Helman. Enhancing Privacy through Negative Representations of Data. Fort Belvoir, VA: Defense Technical Information Center, January 2004. http://dx.doi.org/10.21236/ada498766.
Full textChen, Long, Yadong Huang, Shumiao Ouyang, and Wei Xiong. The Data Privacy Paradox and Digital Demand. Cambridge, MA: National Bureau of Economic Research, May 2021. http://dx.doi.org/10.3386/w28854.
Full textChiou, Lesley, and Catherine Tucker. Search Engines and Data Retention: Implications for Privacy and Antitrust. Cambridge, MA: National Bureau of Economic Research, September 2017. http://dx.doi.org/10.3386/w23815.
Full textSavic, Milovan. Montana’s TikTok ban a wake up call on data privacy. Edited by Reece Hooker. Monash University, June 2023. http://dx.doi.org/10.54377/c3c7-ab72.
Full textDemirer, Mert, Diego Jiménez-Hernández, Dean Li, and Sida Peng. Data, Privacy Laws and Firm Production: Evidence from the GDPR. Federal Reserve Bank of Chicago, 2024. http://dx.doi.org/10.21033/wp-2024-02.
Full text