Добірка наукової літератури з теми "Private attribute"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Private attribute".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Private attribute":

1

Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang, and Willy Susilo. "Privacy-enhanced attribute-based private information retrieval." Information Sciences 454-455 (July 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zhang, Hao, Yue Zhao, Jintao Meng, Xue Wang, and Kaijun Wu. "Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer." Electronics 12, no. 21 (November 1, 2023): 4502. http://dx.doi.org/10.3390/electronics12214502.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Attribute-based encryption enables users to flexibly exchange and share files with others. In these schemes, users utilize their own attributes to acquire public-private key pairs from the key generation center. However, achieving this for users who wish to keep their attributes private poses a challenge. To address this contradiction, we propose an original scheme that combines ciphertext policy attribute-based encryption with a k-out-of-n oblivious transfer protocol. This scheme allows the distribution of corresponding public-private key pairs to users without the key generation center needing to obtain specific user attributes. Furthermore, it ensures the privacy of the key generation center. Security analysis demonstrates that the scheme is secure in the random oracle model. Our performance comparison and experimental results indicate that the scheme is both flexible and efficient.
3

Battaglia, Elena, Simone Celano, and Ruggero G. Pensa. "Differentially Private Distance Learning in Categorical Data." Data Mining and Knowledge Discovery 35, no. 5 (July 13, 2021): 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractMost privacy-preserving machine learning methods are designed around continuous or numeric data, but categorical attributes are common in many application scenarios, including clinical and health records, census and survey data. Distance-based methods, in particular, have limited applicability to categorical data, since they do not capture the complexity of the relationships among different values of a categorical attribute. Although distance learning algorithms exist for categorical data, they may disclose private information about individual records if applied to a secret dataset. To address this problem, we introduce a differentially private family of algorithms for learning distances between any pair of values of a categorical attribute according to the way they are co-distributed with the values of other categorical attributes forming the so-called context. We define different variants of our algorithm and we show empirically that our approach consumes little privacy budget while providing accurate distances, making it suitable in distance-based applications, such as clustering and classification.
4

Zhang, Guo Yan. "A Multi-Authority Attribute-Based Encryption System Against Malicious KGC." Advanced Engineering Forum 6-7 (September 2012): 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Attribute-based encryption scheme is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Similar with identity-based encryption scheme, attribute-based schemes are also confronted with key escrow problem. Furthermore, the attributes belonging to a user usually are monitored by different authorities. This paper resolves the two problems by using a general attribute-based encryption scheme and K-Sibling intractable function families. In our construction, different attributes sets of a user are still certified by different authorities, but the partial private keys corresponding to the attributes are generated by a central authority. Simultineously, different authorities jointly generate the users’ secret value which cannot be obtained by the central authority. Compared with general multi-authourity attributed-based encryption scheme, our approach has more efficiency.
5

Rezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh, and Vitality Kinakh. "Privacy-Preserving Image Template Sharing Using Contrastive Learning." Entropy 24, no. 5 (May 3, 2022): 643. http://dx.doi.org/10.3390/e24050643.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the recent developments of Machine Learning as a Service (MLaaS), various privacy concerns have been raised. Having access to the user’s data, an adversary can design attacks with different objectives, namely, reconstruction or attribute inference attacks. In this paper, we propose two different training frameworks for an image classification task while preserving user data privacy against the two aforementioned attacks. In both frameworks, an encoder is trained with contrastive loss, providing a superior utility-privacy trade-off. In the reconstruction attack scenario, a supervised contrastive loss was employed to provide maximal discrimination for the targeted classification task. The encoded features are further perturbed using the obfuscator module to remove all redundant information. Moreover, the obfuscator module is jointly trained with a classifier to minimize the correlation between private feature representation and original data while retaining the model utility for the classification. For the attribute inference attack, we aim to provide a representation of data that is independent of the sensitive attribute. Therefore, the encoder is trained with supervised and private contrastive loss. Furthermore, an obfuscator module is trained in an adversarial manner to preserve the privacy of sensitive attributes while maintaining the classification performance on the target attribute. The reported results on the CelebA dataset validate the effectiveness of the proposed frameworks.
6

Zhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei, and Quan Wang. "ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities." Security and Communication Networks 2021 (March 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/5531369.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Smart cities require new access control models for Internet of Things (IoT) devices that preserve user privacy while guaranteeing scalability and efficiency. Researchers believe that anonymous access can protect the private information even if the private information is not stored in authorization organization. Many attribute-based access control (ABAC) models that support anonymous access expose the attributes of the subject to the authorization organization during the authorization process, which allows the authorization organization to obtain the attributes of the subject and infer the identity of the subject. The ABAC with anonymous access proposed in this paper called ABSAC strengthens the identity-less of ABAC by combining homomorphic attribute-based signatures (HABSs) which does not send the subject attributes to the authorization organization, reducing the risk of subject identity re-identification. It is a secure anonymous access framework. Tests show that the performance of ABSAC implementation is similar to ABAC’s performance.
7

Pin, Lim Wei, and Manmeet Mahinderjit Singh. "User authentication using gait and enhanced attribute-based encryption: a case of smart home." Bulletin of Electrical Engineering and Informatics 13, no. 3 (June 1, 2024): 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the increasing popularity of the internet of things (IoT) application such as smart home, more data is being collected, and subsequently, concerns about preserving the privacy and confidentiality of these data are growing. When intruders attack and get control of smart home devices, privacy is compromised. Attribute-based encryption (ABE) is a new technique proposed to solve the data privacy issue in smart homes. However, ABE involves high computational cost, and the length of its ciphertext/private key increases linearly with the number of attributes, thus limiting the usage of ABE. This study proposes an enhanced ABE that utilises gait profile. By combining lesser number of attributes and generating a profiling attribute that utilises gait, the proposed technique solves two issues: computational cost and one-to-one encryption. Based on experiment conducted, computational time has been reduced by 55.27% with nine static attributes and one profile attribute. Thus, enhanced ABE is better in terms of computational time.
8

Han, Fei, and Jing Qin. "A Function Private Attribute-Based Encryption." International Journal of Distributed Sensor Networks 10, no. 1 (January 2014): 749568. http://dx.doi.org/10.1155/2014/749568.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga, and Aitor Urbieta. "Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes." Smart Cities 6, no. 2 (March 10, 2023): 913–28. http://dx.doi.org/10.3390/smartcities6020044.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Attribute spoofing is a major security threat in information exchange solutions based on Ciphertext-Policy Attribute-Based-Encryption (CP-ABE) and distributed CP-ABE (dCP-ABE), which can compromise privacy and security. This threat occurs when an attacker forces the Attribute Authorities to generate keys for attributes they do not possess. This paper analyzes the threat of attribute spoofing and identifies the primary attack vectors, including direct interference with the Attribute Authority and compromise of the shared attribute storage database. The authors propose a solution based on IOTA, a DAG-type DLT, and Interplanetary File System (IPFS) to prevent attribute spoofing. The solution requires distributed attribute storage, validation, and user authentication to counteract the two attack vectors effectively. The proposed solution mitigates the consequences of attribute spoofing, including privilege escalation and reduction, acquisition of private keys, and cutoff of data access. The authors also evaluate their proposal through a value-chain use case and conclude that it effectively mitigates the consequences of attribute spoofing.
10

Arroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong, and Binghui Wang. "Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 10 (March 24, 2024): 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Federated learning (FL) has been widely studied recently due to its property to collaboratively train data from different devices without sharing the raw data. Nevertheless, recent studies show that an adversary can still be possible to infer private information about devices' data, e.g., sensitive attributes such as income, race, and sexual orientation. To mitigate the attribute inference attacks, various existing privacy-preserving FL methods can be adopted/adapted. However, all these existing methods have key limitations: they need to know the FL task in advance, or have intolerable computational overheads or utility losses, or do not have provable privacy guarantees. We address these issues and design a task-agnostic privacy-preserving presentation learning method for FL (TAPPFL) against attribute inference attacks. TAPPFL is formulated via information theory. Specifically, TAPPFL has two mutual information goals, where one goal learns task-agnostic data representations that contain the least information about the private attribute in each device's data, and the other goal ensures the learnt data representations include as much information as possible about the device data to maintain FL utility. We also derive privacy guarantees of TAPPFL against worst-case attribute inference attacks, as well as the inherent tradeoff between utility preservation and privacy protection. Extensive results on multiple datasets and applications validate the effectiveness of TAPPFL to protect data privacy, maintain the FL utility, and be efficient as well. Experimental results also show that TAPPFL outperforms the existing defenses.

Дисертації з теми "Private attribute":

1

Ahadzi, Marcus K. "Public private partnerships in infrastructure procurement : a generic multi-attribute hierarchical model for minimising pre-contract time and cost overruns (GmAHM)." Thesis, Heriot-Watt University, 2004. http://hdl.handle.net/10399/1151.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Guerreiro, Ana José. "Marcas de distribuidor no sector alimentar." Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/16182.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As marcas de distribuidor têm vindo a evoluir nos últimos anos, sobretudo no sector alimentar, sendo um dos pilares do marketing-mix dos distribuidores, atingindo uma quota de mercado de aproximadamente 12 % em Portugal em 2005. O objetivo deste trabalho centra-se na caracterização dos consumidores de marcas de distribuidor, nas razões que os podem levar a adquirirem produtos alimentares com marca de distribuidor e quais as categorias destes produtos alimentares mais preferidas pelos consumidores. Para responder aos objetivos recorreu-se a um estudo, onde foi utilizado o questionário como instrumento de recolha de dados primários. Os dados foram analisados mediante estatísticas variadas, desde medidas de localização a análise de clusters e fatorial. Concluiu-se que a maior parte dos inquiridos são consumidores de marcas de distribuidor e consideram como razões mais importantes para efetuarem compras de produtos com a marca de distribuidor a qualidade e o preço. As categorias de produtos alimentares com maior frequência de compra, são a mercearia grossa e o OPLS (Outros Produtos de Livre Serviço). /ABSTRACT - Private labels have been evoluting from the past years, mostly in the food sector, being one of the pillars of the distributor marketing-mix, reaching a share of, more or less, 12% in Portugal in 2005. The main purpose of this assignment is the characterization of private labels consumers, the reasons that can lead them to acquire private labels food products and which are the categories of food products that are preferred by consumers. To answer to these aims I've done a study using a questionnaire as an instrument of primary data assembles. Data have been analyzed according to various statistic analyses, since locations measures to clusters and factorial analyses. It can be concluded that most of the inquired people in this questionnaire are private labels consumers. They consider quality and price as the most important factors in order to buy private label products in food sectors. Food categories with bigger frequency of purchase are grocery and OPLS.
3

Alipour, Pijani Bizhan. "Attaques par inférence d'attributs sur les publications des réseaux sociaux." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Les réseaux sociaux contiennent de nombreuses informations personnelles telles que le genre, l'âge ou le statut d'une relation. Leur popularité et leur importance en font des cibles privilégiés pour des activités malveillantes menaçant la vie privée des utilisateurs. Les paramètres de sécurité disponibles sur les réseaux sociaux n'empêchent pas les attaques par inférence d'attribut, qui consistent pour l'attaquant à obtenir des données privées (comme le genre) à partir d'informations publiques. La divulgation d'une information personnelle peut avoir des conséquences négatives comme devenir la cible de spams, de harcèlements, ou se faire cloner son profil. Les techniques d'inférence les plus connues s'appuient soit sur l'analyse du comportement de l'utilisateur cible à travers ses préférences (e.g., likes) et ses groupes, soit sur ses listes d'amis. Cependant, en pratique, les informations disponibles pour ces attaques sont souvent limitées car beaucoup d'utilisateurs ont pris conscience des menaces et préfèrent protéger leurs données. Pour que les usagers des réseaux sociaux comprennent mieux les risques encourus par leur vie privée, dans cette thèse nous introduisons une nouvelle classe d'attaques par inférence sur les attributs de ces usagers. Nous montrons que ces attaques nécessitent très peu d'information. Elles s'appliquent même à des usagers qui protègent les éléments de leur profil ainsi que leurs commentaires. La méthode que nous proposons consiste à analyser les métadatas d'une image publiée sur Facebook, à savoir i) les tags engendrés par Facebook pour décrire les images (e.g., pour les usagers malvoyants), et ii) les commentaires sous formes textuelle ou d'émojis déposés sous l'image. Nous montrons comment réaliser ces attaques sur un utilisateur de Facebook en i) appliquant une technique de retrofitting pour traiter le vocabulaire rencontré en ligne et qui ne figurait pas dans la base d'apprentissage et ii) en calculant plusieurs plongements pour les unités textuelles (e.g., mot, emoji) chacun dépendant d'une valeur spécifique d'un attribut. Finalement nous proposons ProPic, un mécanisme de protection qui sélectionne de manière rapide des commentaires à cacher toute en minimisant la perte d'utilité, définie par une mesure sémantique. Le système permet aux utilisateurs de vérifier s'ils sont vulnérables à des attaques par inférence et, le cas échéant de suggérer les commentaires à cacher pour prévenir ces attaques. Nous avons pu vérifier l'efficacité de l'approche par des expérimentations sur des données réelles
Online Social Networks (OSN) are full of personal information such as gender, age, relationship status. The popularity and growth of OSN have rendered their platforms vulnerable to malicious activities and increased user privacy concerns. The privacy settings available in OSN do not prevent users from attribute inference attacks where an attacker seeks to illegitimately obtain their personal attributes (such as the gender attribute) from publicly available information. Disclosure of personal information can have serious outcomes such as personal spam, bullying, profile cloning for malicious activities, or sexual harassment. Existing inference techniques are either based on the target user behavior analysis through their liked pages and group memberships or based on the target user friend list. However, in real cases, the amount of available information to an attacker is small since users have realized the vulnerability of standard attribute inference attacks and concealed their generated information. To increase awareness of OSN users about threats to their privacy, in this thesis, we introduce a new class of attribute inference attacks against OSN users. We show the feasibility of these attacks from a very limited amount of data. They are applicable even when users hide all their profile information and their own comments. Our proposed methodology is to analyze Facebook picture metadata, namely (i) alt-text generated by Facebook to describe picture contents, and (ii) commenters’ words and emojis preferences while commenting underneath the picture, to infer sensitive attributes of the picture owner. We show how to launch these inference attacks on any Facebook user by i) handling online newly discovered vocabulary using a retrofitting process to enrich a core vocabulary that was built during offline training and ii) computing several embeddings for textual units (e.g., word, emoji), each one depending on a specific attribute value. Finally, we introduce ProPic, a protection mechanism that selects comments to be hidden in a computationally efficient way while minimizing utility loss according to a semantic measure. The proposed mechanism can help end-users to check their vulnerability to inference attacks and suggests comments to be hidden in order to mitigate the attacks. We have determined the success of the attacks and the protection mechanism by experiments on real data
4

Park, Sang Mork. "PRIVACY-PRESERVING ATTRIBUTE-BASED ACCESS CONTROL IN A GRID." Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1283121251.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

THOBANI, SHAIRA. "CONTRATTO E ATTRIBUTI IMMATERIALI DELLA PERSONA." Doctoral thesis, Università degli Studi di Milano, 2016. http://hdl.handle.net/2434/351967.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The present thesis examines the relationship between contract, on the one hand, and publicity and privacy rights, on the other hand. The possibility to dispose of publicity rights – which, in the Italian system, are not easily separated from privacy rights – by means of contract is traditionally denied, due to the alleged inalienability of such rights. The first part of this work therefore analyses the meaning of inalienability, aiming to investigate the reasons underlying the traditional doctrine, and concludes that, in the modern economy, there are no solid grounds on which to reject the possibility to dispose of one's publicity rights. The thesis then examines the different kinds of contracts in question, which range from merchandising to film-making agreements, from endorsement contracts to agreements aimed to authorize the processing of personal data. The regulation of such contracts - which is not explicitly provided for by the legislator – must take into account the need to protect the person in the disposition of rights which are strongly connected to her personality. For this purpose, these agreements are subject to strict interpretation and the person must be granted the right to recede from the contract in certain qualified circumstances. The thesis therefore analyses such regulation and focuses, more specifically, on the consequences on our subject matter of the legislation on personal data.
6

ZHENG, YAO. "Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption." Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-theses/902.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
"Personal health record (PHR) service is an emerging model for health information exchange. It allows patients to create, manage, control and share their health information with other users as well as healthcare providers. In reality, a PHR service is likely to be hosted by third-party cloud service providers in order to enhance its interoperability. However, there have been serious privacy concerns about outsourcing PHR data to cloud servers, not only because cloud providers are generally not covered entities under HIPAA, but also due to an increasing number of cloud data breach incidents happened in recent years. In this thesis, we propose a privacy-preserving PHR system using attribute-based encryption (ABE). In this system, patients can encrypt their PHRs and store them on semi-trusted cloud servers such that servers do not have access to sensitive PHR contexts. Meanwhile patients maintain full control over access to their PHR files, by assigning fine-grained, attribute-based access privileges to selected data users, while different users can have access to different parts of their PHR. Our system also provides extra features such as populating PHR from professional electronic health record (EHR) using ABE. In order to evaluate our proposal, we create a Linux library that implement primitive of key-policy attribute-based encryption (KP-ABE) algorithms. We also build a PHR application based on Indivo PCHR system that allow doctors to encrypt and submit their prescription and diagnostic note to PHR servers using KP-ABE. We evaluate the performance efficiency of different ABE schemes as well as the data query time of Indivo PCHR system when PHR data are encrypted under ABE scheme."
7

Seethamraju, Arun Tej. "Attribute Based Encryption of Electronic Health Records : Comparative study of existing algorithms." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14093.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cloud Computing today, is an evolving technology which features large Data Storage and ready-to-access from any device. The Healthcare Industry stores large Databases of patient’s records, considering the advantages of Cloud Computing it is looking forward to moving on from the traditional, proprietary Database Management Model into an Open Source Cloud DBMS Model. To complete this transition, it is of primary importance to provide Privacy and Security for Electronic Medical Record / Electronic Health Record. There are several kinds of research being done on how to mitigate these privacy issues using algorithms like Attribute Based Encryption and Identity-Based Encryption. In this study, we compare the performance of these two attribute based encryption methods. This thesis compares the performance of the state-of-the-art Attribute Based Encryption Schemas for Electronic Medical Record / Electronic Health Record Systems. Performance evaluation is conducted in local and cloud environments. A Literature Review has been performed to identify the existing Cloud-based Electronic Health Record Systems which uses the attribute based encryption as a mechanism to mitigate the privacy issues and realization in Cloud. Two algorithms have been selected by performing snowballing from the IEEE Research Articles. Experimentation was performed on the two algorithms in a local machine and on Amazon Web Services Cloud Platform to compare the performance. Verification of performance in each stage of the execution of the algorithms, in both local machine and Cloud environment, was done.
8

Edirisinghe, Edirisinghe Mudiyanselage Nalaka Sandeepa. "What are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities?" Thesis, Boston University, 2002. https://hdl.handle.net/2144/33464.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (Ed.D.)--Boston University
PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Today, the demand for higher education is growing at a rapid rate in many developing countries throughout the world. Unfortunately, many governments have realized that their public higher education systems are unable to satisfy this demand. Under this condition and strong encouragement from international donors, private higher education has begun to emerge. Sri Lanka is an example where private higher education surfaced in response to a need from its society. However, private higher education remains a foreign and elusive concept for many Sri Lankans. This study seeks to determine what are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities. This study, using traditional push-pull theory, utilized a research design that combined both quantitative and qualitative research methods. The design focused on the pupil, student, teacher, and administrator populations in Colombo, Sri Lanka. Questionnaire surveys and interviews were administered. The data produced consisted of quantitative data from the questionnaire surveys and qualitative data from the interviews, all of which were analyzed for common themes. The study concluded that the major themes of the responses included the cost of higher education, quality of higher education, recognition of higher education, and the environment within higher education institutions. Further, the study also discovered several minor themes that played a role for some pupils and students. These included the medium of instruction and the issue of social class in higher education. The recommendations proposed include a need to provide pupils with loans to pursue higher education, to increase awareness of private higher education, to establish smaller private community colleges in rural areas of Sri Lanka and to provide more interaction between public and private higher education.
2031-01-01
9

Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cette thèse vise à comprendre le risque de fuite d’informations personnelles sur un réseau social. Nous étudions les violations potentielles de la vie privée, concevons des attaques, prouvons leur faisabilité et analysons leur précision. Cette approche nous aide à identifier l’origine des menaces et constitue un premier pas vers la conception de contre-mesures efficaces. Nous avons d’abord introduit une mesure de sensibilité des sujets à travers une enquête par questionnaire. Puis, nous avons conçu des attaques de divulgation (avec certitude) des liens d’amitié et des liens d’appartenance aux groupes sur “Facebook”. Ces attaques permettent de découvrir le réseau local d’une cible en utilisant uniquement des requêtes légitimes. Nous avons également conçu une technique d’échantillonnage pour collecter rapidement des données utiles autour d’une cible. Les données collectées sont ensuite représentées par des graphes et utilisées pour effectuer des inférences d’attributs (avec incertitude). Pour augmenter la précision des attaques, nous avons conçu des algorithmes de nettoyage. Ces algorithmes quantifient la corrélation entre les sujets, sélectionnent les plus pertinents et permettent de gérer la rareté (sparsity) des données. Enfin, nous avons utilisé un réseau de neurones pour classer les données et déduire les valeurs secrètes d’un attribut sensible d’une cible donnée avec une précision élevée mesurée par AUC sur des données réelles. Les algorithmes proposés dans ce travail sont inclus dans un système appelé SONSAI qui aide les utilisateurs finaux à contrôler la collecte d’informations sur leur vie privée
In this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
10

Vasconcellos, Paulo Roberto Nascimento Meira. "Habilidades e Atitudes Relevantes na Composi??o do Perfil Profissional de Gestores de Institui??o de Ensino Superior de Car?ter Privado." Universidade Federal Rural do Rio de Janeiro, 2006. https://tede.ufrrj.br/jspui/handle/tede/970.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Made available in DSpace on 2016-04-28T20:19:15Z (GMT). No. of bitstreams: 1 2006-Paulo Roberto Nascimento Meira Vasconcellos.pdf: 1413172 bytes, checksum: 5ff61766dea9829714eab7042d67a796 (MD5) Previous issue date: 2006-08-30
This study is based on a research aiming to verify the most relevant skills and attitudes for the composition of the professional profile of the managers of private institution of superior education. The methodology of exploratory study was adopted in this work, in order to contributes for academic literature, because it deepens a subject associated with abilities and business management. Nowadays, these subjects are highlighted because they help verifying the attributes that are perceived as important to compose the profile of the academics managers, aiming better performing their managerial functions. For the accomplishment of the present study, the data were collected by a questionnaire, which had been answered by professionals who work in a private institution of superior education located in the city of Rio de Janeiro, during the months of November of 2005 and January of 2006. The idea of competencies, more specifically centered in two of its components, the abilities and the attitudes, was evidenced according to the views of the interviews. The results observed in the present research point those attributes that had been considered as relevant. The abilities of communication, negotiation, creativity, logic and relationship; and the attitudes of responsibility, honesty, balance, ethics and disciplines are the attributes that have been most pointed out in this research.
Este trabalho realiza uma investiga??o com a finalidade de verificar as habilidades e atitudes relevantes para a composi??o do perfil profissional dos gestores de institui??o de ensino superior de car?ter privado. Empregando a metodologia do estudo explorat?rio, este trabalho contribui para a literatura acad?mica, por aprofundar um tema ligado ? compet?ncia e ? gest?o, ao verificar os atributos que s?o percebidos como importantes, por parte de diretores, coordenadores e professores, para compor o perfil dos gestores, visando o exerc?cio de suas fun??es. Para a consecu??o do presente estudo, optou-se pela confec??o de um question?rio, que foi respondido por profissionais pertencentes a uma institui??o de ensino superior de car?ter privado. A pesquisa foi levada a efeito entre os meses de novembro de 2005 e janeiro de 2006. A no??o de compet?ncia, mais especificamente centrada em dois de seus componentes, as habilidades e as atitudes, teve suas relev?ncias evidenciadas segundo a percep??o dos entrevistados. Os resultados alcan?ados na presente pesquisa apontam aqueles atributos que, de acordo com a percep??o dos entrevistados, foram considerados como relevantes. Dentre esses atributos foram evidenciadas, dentre outras, as habilidades de comunica??o, negocia??o, criatividade, l?gica e conviv?ncia, e as atitudes de responsabilidade, honestidade, equil?brio, ?tica e disciplina.

Книги з теми "Private attribute":

1

Giornata di studi sui Fondi oro della collezione Crespi (2004 Milan, Italy). I Fondi oro della collezione Alberto Crespi al Museo diocesano di Milano: Questioni iconografiche e attributive : atti della Giornata di studi, 11 ottobre 2004. Cinisello Balsamo, Milano: Silvana, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Censi, Martina. Rituali di segni e metamorfosi Ṭuqūs al-išārāt wa-l-taḥawwulāt. Venice: Fondazione Università Ca’ Foscari, 2020. http://dx.doi.org/10.30687/978-88-6969-475-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Ṭuqūs al-išārāt wa-l-taḥawwulāt (Rituals of Signs and Transformations), published in 1994, is a play which can be attributed to the last phase of Saʿd Allāh Wannūs’s literary production. At this stage, the Syrian author’s political commitment is no longer expressed through the interest for the collective dimension, but it focuses on the individual, considered as a pivotal element for social change. In Ṭuqūs, Saʿd Allāh Wannūs revisits history from an individual point of view, fragmenting it into a multiplicity of micro-narratives. During the 1880s in Damascus, the muftī, the chief religious legal authority, and the leader of the ašrāf, the descendants of the Prophet, are involved in a feud that splits the city into factions and brings it on the verge of anarchy. When the chief of police arrests the leader of the ašrāf while he is engaged in lovemaking with his mistress in his semi-private garden, the muftī concocts a scheme to save his enemy’s reputation, but his real aim is to subdue him and get rid of him. This event triggers a series of transformations involving the identities of the characters. Thus, the leader of the ašrāf, a regular of prostitutes and assiduous drinker, suddenly becomes a mystic with ascetic ambitions, while the upright muftī loses his head for a high-ranking woman who leaves her respectable life to become a prostitute. The whole society is destabilized by the desires of the characters. Desire not only affects their individual identity, but it also exerts influence on their social position, undermining a system of norms based on hypocrisy and on the division between the ‘latent’ and the ‘manifest’.
3

Hotel Drouot. Ensemble de 16 œuvres par Henri Matisse, tableaux et sculptures modernes, art nouveau, art déco: C. Berard, J. Cartier, E. Cortès, A. Foächz, L. Icart, S. Lalique, H. Lebasque, Paubes, H. Plisson, H.J. Pontoy, A.G. Privat, E.M. Sandoz, O. Spielmann, P.R. Chevré, J. Coquillay, A. Gennarelli, V. Hayez, M.E. Jacquin, C. Marioton, M. Quef, A. Rodin, J. Terzi ef : objets d'art - céramiques par : Bing & Groendahl, T.J. Deck, Denbac, E. Gallé, M. Goupy, A. Heiligeinstein, R. Lallemant, E. Müller & J.A. Dampt, E. Müller & E. Bussière & Keller & Guérin, Picasso, Sèvres : verreries par Daum, E. Gallé, Jean, R. Lalique, Schneider : mobilier par ou attribué à Airborne, Courtray, A. Domin & M. Genevrière, Dominique, E. Gallé, J. & J. Kohn, G. Modigliani. Paris: Hôtel Drouot, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Walsch, Neale Donald. Conversations with God, Book 4: Awaken the Species. Rainbow Ridge Publishing, 2019.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

MariAnna, Cara. Abortion. www. praeger. com, 2002. http://dx.doi.org/10.5040/9798216188384.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Stories about abortion provide a rich ground for looking at the relationship between narrative, experience, and meaning because in many ways abortion has come to be a defining issue for American culture—one that touches on the value we attribute to human life, liberty, and freedom. Using personal stories and interviews, MariAnna seeks to show the contours of a vital and diverse collective story—a narrative that emphasizes the discursive dynamics at work in any account of the significance of abortion. MariAnna seeks to show the contours of a vital and diverse collective story—a narrative that emphasizes the discursive dynamics at work in any account of the significance of abortion. By attempting to find a range of narrative and experiential extremes, she provides diverse and detailed accounts that form a collective story. The accounts she provides are about actual experience, but because the meaning of that experience is created and conveyed in narrative form, there is no neat distinction between a story and the event to which it refers. Meaning is embedded in larger cultural narrative: the individual stories told about abortion and the intersection between them. These stories illustrate how experience itself is mediated by, to some extent even a function of, narrative modes and currents. They illustrate the way autobiographical history is so enmeshed in cultural narrative forms that the private accounts we give of our own lives function as often unacknowledged social commentary. Stories about abortion provide a rich ground for looking at the relationship between narrative, experience, and meaning because in many ways abortion has come to be a defining issue for American culture—one that touches on the value we attribute to human life, liberty, and freedom. This book will be of particular interest to scholars, students, and researchers involved with Women's Studies and Women's Health issues and to general readers concerned with contemporary American social problems.
6

Miner, Jeremy T., Lynn E. Miner, and Jerry Griffith. Collaborative Grantseeking. ABC-CLIO, LLC, 2011. http://dx.doi.org/10.5040/9798400628221.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This book offers a detailed analysis of the strategies and methodologies of successful collaborative grant writing, as well as practical guidance on the interpersonal leadership requirements of managing grantseeking projects. As it becomes increasingly difficult to obtain public or private funding, collaboration may become absolutely vital to some nonprofits' continued existence. Effective grant collaborations always comprise a critical attribute: they are led by individuals who not only understand the benefits and barriers affecting collaborations, but are highly skilled in managing them. This reference text explains the nature of the collaboration and a critical examination of the role of the grant leader, giving nonprofit fundraisers a competitive edge in collaborative grantseeking, especially for those individuals without previous experience in this complicated arena. No other book comprehensively explains every step in a successful collaborative grantseeking effort, nor provides real-world strategies and proven practices. Readers of Collaborative Grantseeking: A Guide to Designing Projects, Leading Partners, and Persuading Sponsors will also better grasp the humanistic aspects of designing and leading successful collaborative projects and be able to write more persuasive proposals.
7

Petrisko, Thomas. The Kingdom of Our Father. St. Andrew\'s Productions, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

RANGANATHAN, VINAY, and E. ESWARA REDDY. A STUDY ON LEADERSHIP STYLES OF PRINCIPALS AND ORGANIZATIONAL COMMITMENT OF TEACHERS IN SECONDARY SCHOOLS OF BENGALURU CITY. Jupiter Publications Consortium, 2023. http://dx.doi.org/10.47715/jpc.b.978-93-91303-72-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The problem statement of the study was to compare the educational leadership behaviours of government and private school principals in Bengaluru city and to understand the organizational commitment of teachers in relation to demographic variables. The objectives were i) to study perceptions of secondary school teachers on the leadership styles of their Principals ii) to compare the differences in leadership attributes between government and private school principals in select schools of Bengaluru city iii) to study the influence of demographic variables on the organizational commitment of the teachers iv) to provide valuable suggestions to policy makers on building a successful institution to get better results The sample of the study was drawn using random sampling technique from 56 schools and consisted of 384 teachers: 107 teachers from government and 277 teachers from private high schools in Bengaluru city (urban district). The theoretical backdrop of the research was based on transactional and transformational leadership theories. Modified versions of the multifactor leadership and the organizational commitment questionnaire was used for the study. Statistical analysis using mean, standard deviation, independent samples ‘t’ tests, one-way ANOVA and confirmatory factor analysis was used for analysis of data. The major findings of the study were that i) differences on certain attributes were observed in both transactional and transformational leadership styles between government and private school principals. ii) ‘Critical thinking’ and ‘participative’ were the styles of leadership practiced in government schools. iii) ‘Micromanagement’ and ‘charismatic’ were the styles of leadership practiced in private schools iv) personal variables like gender and age were found to have significant impact on organizational commitment of teachers iv) academic variables like experience and educational qualifications were found to have significant impact on organizational commitment of teachers. Separate leadership models for both government and private schools were developed by the researcher highlighting important attributes that lead to the growth and the success of an organization. The study has also provided principals with an overview on what factors affected the teacher’s commitment in their schools and how they could effectively modify their leadership style to improve efficiency in teaching and learning. Suggestions are provided separately for policy makers in the government and for private managements on approaches to improve effective leadership in government and private schools In conclusion, experience of these principals, journey into their administration and the way in which they have articulated their role over the years has given valuable insights for the future generation. There is no doubt that transformational leadership is the right way forward in Indian educational administration and implications of this research must reach beyond Bengaluru to enable teachers and Principals across the country to work together to build a strong society for the citizens of tomorrow.
9

Chadwick, Anna. Law and the Political Economy of Hunger. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198823940.001.0001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This book offers the first in-depth analysis of the significance of law in the context of world hunger. The book takes as its starting point the global food crisis in 2007–08—a crisis said to have been exacerbated by financial speculators ‘gambling’ on the price of food via commodity derivatives. Challenging the tendency to attribute the highly differentiated impact of the crisis to an underlying condition of ‘food insecurity’, the author relates the role that international law has played in making some populations ‘food insecure’ in the first instance. The book then examines recent developments in the financialization of agriculture and links these developments to structural changes in the global economy since the 1980s. Food commodity speculation—the practice linked to the causation of the global food crisis—is used as a case study to explore the interaction of regimes of law that attempt to regulate market conduct and legal regimes that create markets and enable them to operate. The tension between efforts to regulate speculative market behaviour and bodies of private law that anticipate and operationalize that same behaviour is exposed. The book concludes with a critical analysis of the potential of a human right to adequate food to address the problem of world hunger. Far from being the result of a lack of regulation, or even unrealized human rights, the book argues that prevalence of hunger in the contemporary period is a product of capitalist political economy and the legal structures that underpin it.
10

Li-Huang, Rebecca. The Psychology of High Net Worth Individuals. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190269999.003.0010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This chapter takes an economic view of the investment behavior of high net worth individuals (HNWIs), including: the psychological aspects of private wealth and the practice of wealth management, the current trends affecting the players and markets, and empirical findings on wealth creation and distribution that have fueled policy debates. As the chapter shows, wealth concentrations and scarcity of skills have attributed to institutional advantages for HNWIs and the highly skilled, including higher returns on physical and human capital investments. Besides achieving financial returns, HNWIs want to use their private wealth to have a social impact. Wealth managers respond to the attitude and behavior of HNWIs by shifting the focus from investment products and transactions to holistic investing and goal-based wealth management.

Частини книг з теми "Private attribute":

1

Zhou, Xianlin, Hailong Ye, and Jun Ye. "Attribute-Based Encryption Without Abuse of Private Keys." In Advances in Intelligent Systems and Computing, 1475–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25128-4_180.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lin, Xi, and Yiliang Han. "Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption." In Communications in Computer and Information Science, 220–30. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6385-5_19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Liu, Bo, Baokang Zhao, Bo Liu, and Chunqing Wu. "An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks." In Security Engineering and Intelligence Informatics, 393–407. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40588-4_27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Liu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, and Xiaoyan Zhu. "Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization." In Communications in Computer and Information Science, 175–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractIn recent years, with the development of mobile terminals, geographic location has attracted the attention of many researchers because of its convenience in collection and its ability to reflect user profile. To protect user privacy, researchers have adopted local differential privacy in data collection process. However, most existing methods assume that location has already been discretized, which we found, if not done carefully, may introduces huge noise, lowering collected result utility. Thus in this paper, we design a differentially private location division module that could automatically discretize locations according to access density of each region. However, as the size of discretized regions may be large, if directly applying existing local differential privacy based attribute method, the overall utility of collected results may be completely destroyed. Thus, we further improve the optimized binary local hash method, based on personalized differential privacy, to collect user visit frequency of each discretized region. This solution improve the accuracy of the collected results while satisfying the privacy of the user’s geographic location. Through experiments on synthetic and real data sets, this paper proves that the proposed method achieves higher accuracy than the best known method under the same privacy budget.
5

Di Crescenzo, Giovanni, Debra Cook, Allen McIntosh, and Euthimios Panagos. "Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database." In Lecture Notes in Computer Science, 339–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43936-4_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Nastou, Panayotis E., Dimitra Nastouli, Panos M. Pardalos, and Yannis C. Stamatiou. "A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies." In Computation, Cryptography, and Network Security, 399–412. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18275-9_17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

De Soete, Marijke. "Attribute Certificate." In Encyclopedia of Cryptography, Security and Privacy, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_279-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Rot, Peter, Peter Peer, and Vitomir Štruc. "Detecting Soft-Biometric Privacy Enhancement." In Handbook of Digital Face Manipulation and Detection, 391–411. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractWith the proliferation of facial analytics and automatic recognition technology that can automatically extract a broad range of attributes from facial images, so-called soft-biometric privacy-enhancing techniques have seen increased interest from the computer vision community recently. Such techniques aim to suppress information on certain soft-biometric attributes (e.g., age, gender, ethnicity) in facial images and make unsolicited processing of the facial data infeasible. However, because the level of privacy protection ensured by these methods depends to a significant extent on the fact that privacy-enhanced images are processed in the same way as non-tampered images (and not treated differently), it is critical to understand whether privacy-enhancing manipulations can be detected automatically. To explore this issue, we design a novel approach for the detection of privacy-enhanced images in this chapter and study its performance with facial images processed by three recent privacy models. The proposed detection approach is based on a dedicated attribute recovery procedure that first tries to restore suppressed soft-biometric information and based on the result of the restoration procedure then infers whether a given probe image is privacy enhanced or not. It exploits the fact that a selected attribute classifier generates different attribute predictions when applied to the privacy-enhanced and attribute-recovered facial images. This prediction mismatch (PREM) is, therefore, used as a measure of privacy enhancement. In extensive experiments with three popular face datasets we show that the proposed PREM model is able to accurately detect privacy enhancement in facial images despite the fact that the technique requires no supervision, i.e., no examples of privacy-enhanced images are needed for training.
9

Abendroth, Joerg, Marit Hansen, Ioannis Krontiris, Ahmad Sabouri, Eva Schlehahn, Robert Seidl, and Harald Zwingelberg. "Privacy-ABC Usage Scenarios." In Attribute-based Credentials for Trust, 319–43. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Bichsel, Patrik, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, et al. "An Architecture for Privacy-ABCs." In Attribute-based Credentials for Trust, 11–78. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Private attribute":

1

Masoud Jafarpisheh, Amir, Mahtab Mirmohseni, and Mohammad Ali Maddah-Ali. "Distributed Attribute-based Private Access Control." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834564.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chaves, Iago, and Javam Machado. "Differentially Private Group-by Data Releasing Algorithm." In XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Privacy concerns are growing fast because of data protection regulations around the world. Many works have built private algorithms avoiding sensitive information leakage through data publication. Differential privacy, based on formal definitions, is a strong guarantee for individual privacy and the cutting edge for designing private algorithms. This work proposes a differentially private group-by algorithm for data publication under the exponential mechanism. Our method publishes data groups according to a specified attribute while maintaining the desired privacy level and trustworthy utility results.
3

Beigi, Ghazaleh, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou, and Huan Liu. "Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning." In WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3336191.3371832.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Shan Yinan and Zhenfu Cao. "Extended attribute based encryption for private information retrieval." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5336932.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Wang, Jian, and Jiajin Le. "Based on Private Matching and Min-attribute Generalization for Privacy Preserving in Cloud Computing." In 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2010. http://dx.doi.org/10.1109/iihmsp.2010.186.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mosallanezhad, Ahmadreza, Ghazaleh Beigi, and Huan Liu. "Deep Reinforcement Learning-based Text Anonymization against Private-Attribute Inference." In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Stroudsburg, PA, USA: Association for Computational Linguistics, 2019. http://dx.doi.org/10.18653/v1/d19-1240.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Pei, Xin, Yongjian Wang, Wei Yao, Jiuchuan Lin, and Ruxiang Peng. "Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud." In 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0133.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Mon, Ei Ei, and Thinn Thu Naing. "The privacy-aware access control system using attribute-and role-based access control in private cloud." In Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155974.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Nadendla, Venkata Sriram Siddhardh, and Cedric Langbort. "On estimating multi-attribute choice preferences using private signals and matrix factorization." In 2018 52nd Annual Conference on Information Sciences and Systems (CISS). IEEE, 2018. http://dx.doi.org/10.1109/ciss.2018.8362279.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Cabot-Nadal, Miquel À., Brendan Playford, M. Magdalena Payeras-Capellà, Sebastian Gerske, Macià Mut-Puigserver, and Rosa Pericàs-Gornals. "Private Identity-Related Attribute Verification Protocol Using SoulBound Tokens and Zero-Knowledge Proofs." In 2023 7th Cyber Security in Networking Conference (CSNet). IEEE, 2023. http://dx.doi.org/10.1109/csnet59123.2023.10339754.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Private attribute":

1

Hausmann, Ricardo, and Eduardo Fernández-Arias. The Redesign of the International Financial Architecture from a Latin American Perspective: Who Pays the Bill? Inter-American Development Bank, December 2000. http://dx.doi.org/10.18235/0010789.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper considers ongoing and proposed reforms of the international financial system in light of Latin America's recent experience. Most proposals are based on one of three diagnoses: excessive capital flows, insufficient capital flows, and excessively volatile capital flows. While theories of excessive capital flows lack empirical support, these views underlie both current and suggested reforms. A subsequent section evaluates proposals involving official financial support, private sector involvement, and financial standards and regulations. The paper supports measures to reduce contagion and liquidity crises, such as an international bankruptcy court, and attribute Latin American financial difficulties in part to "original sin", countries' inability to borrow long-term in their own currencies.
2

Zorn, G. RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol Support. RFC Editor, June 2010. http://dx.doi.org/10.17487/rfc5904.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Elacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic, and Carolina Méndez. COVID-19 Exodus: Parent preferences for public schools in Peru. Inter-American Development Bank, August 2023. http://dx.doi.org/10.18235/0005095.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In 2020 in Peru, the Ministry of Education (MINEDU), in response to the COVID-19 pandemic, organized a centralized assignment mechanism that allowed thousands of students at multiple levels of education to move from the private sector to the public sector due to an unprecedented rise in demand. Exploiting the randomness in the assignment of students to their new schools, we causally estimate which public school characteristics families that had decided to study in the private sector before COVID-19 value the most and how preferences for school attributes change after parents experience public schools. We find that families care about the distance to the assigned school and the relative academic and peer quality with respect to their school of origin. Parents weigh features such as distance to school and peer demographics differently when deciding whether or not to remain at the assigned school. These findings provide insights into how governments can strengthen the supply of public schooling.
4

Martinez-Carrasco, José, Otavio Conceição, and Ana Lúcia Dezolt. More Information, Lower Price? Access Market-based Reference Prices and Gains in Public Procurement Efficiency. Inter-American Development Bank, March 2023. http://dx.doi.org/10.18235/0004794.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The paper examines the impact of providing market-based reference prices on public procurement efficiency in Brazil. Specifically, the study focuses on the State Secretariat of Health (SES) in Rio Grande do Sul and the algorithm developed by the local tax administration to calculate representative reference prices for pharmaceutical products. Unlike previous studies, reference prices are calculated based on the universe of local business-to-business transactions. The study finds that SES procurement officers access to this information caused a significant reduction in purchase unit prices, particularly for products characterized by a higher ex-ante unit price, a smaller number of suppliers, and purchased by a smaller number of public institutions. The gains in efficiency are attributed to the use of up-to-date market information, which is particularly useful for products where information asymmetry is more likely to exist between procurement officers and private providers.
5

Elacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic, and Carolina Méndez. Exodus to Public School: Parent Preferences for Public Schools in Peru. Inter-American Development Bank, December 2023. http://dx.doi.org/10.18235/0005497.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Due to an unprecedented rise in demand, in 2020 the Peruvian Ministry of Education implemented a centralized assignment mechanism that allowed thousands of students at various levels of education to move from the private to the public sector. In this paper, we empirically explore the determinants of accepting a public school assignment and, subsequently, remaining in the public system. Specifically, we exploit the randomness in the assignment of students to new public schools to causally estimate the influence of distance on the decision to accept a public school placement, and we explore its role in the decision to remain there. We also provide insights into various determinants of parental preferences. Our findings reveal that families care about distance from home to the assigned public school as well as the relative academic and peer quality with respect to their school of origin. Parents weigh these factors differently based on their familiarity with them. Consequently, experiencing a new school environment can alter the significance of specific attributes when it comes time to decide whether to stay at the assigned school. These findings offer valuable insights into how governments can strengthen the supply of public schooling.
6

Elacqua, Gregory, and Macarena Kutscher. Navigating Centralized Admissions: The Role of Parental Preferences in School Segregation in Chile. Inter-American Development Bank, December 2023. http://dx.doi.org/10.18235/0005484.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, we aim to understand some of the mechanisms behind the low impact of a Chilean educational reform on socioeconomic integration within the school system. We focus on pre-kindergarden (pre-K) admissions, which account for the highest volume of applications since all students (except those applying to private schools) must seek admission through the centralized system. We employ a discrete choice model to analyze parents school preferences. Our analysis reveals that the school choices of low-SES families are more strongly influenced by a schools non-academic attributes which are often omitted from analyses of parental preferences due to data availability constraints rather than academic quality. For instance, low-SES parents tend to prefer schools with fewer reported violent incidents, schools where students report facing less discrimination and exclusion, and schools where students demonstrate higher levels of self-efficacy. Disadvantaged families also tend to favor schools that have a religious affiliation, offer more ”classical” sports (e.g. soccer), or have a foreign name. These results have significant implications for understanding the preferences of disadvantaged families and the impact of centralized admission systems on reducing segregation. By recognizing the non-academic factors driving school choices, policymakers can better design admission systems that truly foster school diversity and equality.
7

Villacis, Alexis, Victor Barrera, Jeffrey Alwang, Carlos Caicedo, and James Quiroz. Strategies to strengthen Ecuador's high-value cacao value chain. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003960.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Since the early nineteenth century, cacao has been an important export earner for Ecuador. Today the importance of this sector remains, as Ecuador is the main producer and exporter of Fine and Flavor cacao worldwide. Motivated by the main transformations of the global food systems and the increasing demand for multidimensional credence attributes, this study examines the present state of Ecuador's cacao industry, identifies areas of opportunity, and discusses how the private and public sectors can work together to meet existing and emerging challenges. Findings are supported by interviews conducted with the principal actors in the Ecuadorian cacao industry and two case studies. The first case study focuses on how associativity can help cacao farmers producing high-quality beans to differentiate themselves and succeed in modern agri-food markets. The second case study explores the success of a local chocolate firm and its links with local cacao farmers. Findings suggest that market trends have created new business opportunities for cacao producers and chocolate processors. These opportunities are most open to firms who can personalize and differentiate their products, for example, through the use of quality certifications such as organic, fair trade, reduced carbon load, etc. More importantly, market developments are driving exporters to enhance the performance of cacao value chains in the country, but the sector requires coordination to capture reputation and credence-based demands for the local cacao.
8

Akbari, Chirag, Ninad Gore, and Srinivas Pulugurtha. Understanding the Effect of Pervasive Events on Vehicle Travel Time Patterns. Mineta Transportation Institute, December 2023. http://dx.doi.org/10.31979/mti.2023.2319.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The COVID-19 pandemic has disrupted daily activities and travel patterns, affecting personal and commercial trips. This study investigates the effect of different stages of the pandemic on travel time patterns. Eighty-six geographically distributed links (sections of road) in Mecklenburg County and Buncombe County, North Carolina, were selected for analysis. The selected links accounted for the variation in road geometry, land use, and speed limit. Travel time data for three years (i.e., 2019, 2020, and 2021) were extracted from a private data source at 5-min intervals. Travel time reliability (TTR) and travel time variability (TTV) are estimated for different phases of the pandemic and compared to analyze the effect of COVID-19 on TTR and TTV. The seasonal arithmetic integrated moving average (SARIMA) model was developed to investigate the effect of COVID-19 on average daily travel time patterns. Unreliable and uncertain travel times were observed on lower speed limit links during the off-peak hours while reliable and certain travel times were observed during morning and evening peak hours of the COVID-19 pandemic. This highlights that the COVID-19 pandemic significantly affected the scheduling of trips. For higher speed limits, travel times were reliable and certain during off-peak and peak hours. Among the different phases of COVID-19, significant improvement in TTR and TTV was observed during Phase II, which could be attributed to stay-at-home directives. Trucks followed a similar pattern as passenger cars. Post-COVID-19, i.e., for 2021, travel times were reliable and certain for most links during the morning peak hours. The SARIMA model revealed a significant effect of COVID-19 on average daily travel time patterns. Stable travel time patterns were noted during Phase II of COVID-19. Moreover, a maximum reduction in travel time was observed during Phase II of the COVID-19 pandemic. The findings emphasize the influence of government norms and regulations on travel time patterns during pervasive events such as COVID-19.
9

Удріс, Ірина Миколаївна, and Наталя Сергіївна Удріс-Бородавко. Design of the Franco-Belgian Exhibition Poster of the 1890-s in the Context of the Art Nouveau Style Formation. КНУКіМ, 2019. http://dx.doi.org/10.31812/123456789/5087.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The purpose of the article is to determine the artistic and graphic peculiarities of the Franco-Belgian exhibition poster of the 1890s in the context of the formation of the Art Nouveau style. The research methodology of the work is based on the use of traditional art methods: historical and cultural, reconstructive and model, historical and attributive, which contributed to the revealing of artistic and graphic transformations in the field of Franco-Belgian spectacular poster. The scientific novelty of the article lies in the author’s artistic interpretation of the stylistic manner of the creators of the spectacular poster in “style floreale” as one of the leading directions of the development of the artistic style of that period. The distinctive features of this type of the artistic work are outlined on the basis of the review of the stylistic and image transformations of exhibition posters of the famous artists – J. Chéret, A. Toulouse-Lautrec, E. Grasset, A. Mucha, A. Privat-Livemont and others. Attention is focused on the identification of the presentation features of the advertised exhibition events as an important cultural events of that time. Means of artistic visualization of information are studied taking into consideration the specific nature of the poster. Conclusions. In the general cultural and historical context of that time, the poster has become a significant component of the formation of national trends in the artistic style of the day, in particular - the Franco-Belgian Art Nouveau style. The exhibition poster, reflecting the stylistic landmarks of the time, contributed to the formation of the artistic vision as a manifestation of the cultural and artistic landmarks of the studied period.
10

Chong, Alberto E., and Florencio López-de-Silanes. Privatization in Mexico. Inter-American Development Bank, August 2004. http://dx.doi.org/10.18235/0010832.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Over the last 20 years, Mexico redefined the role of the state in its economy through an ambitious program to liberalize trade, promote efficiency and reduce the size and scope of the state-owned sector. In Mexico, privatization led to a significant improvement in firm performance, as profitability increased 24 percentage points and converged to levels similar to those of private firms. From this increase, at most 5 percent can be attributed to higher prices and 31 percent to transfers from workers, with the remaining 64 percent representing productivity gains. There is evidence that privatization provides other social benefits, as greater access to services, which usually follows privatization, leads to welfare gains for the poorest consumers that outweigh any increase in prices. Moreover, an often-overlooked aspect of privatization is its fiscal impact, whereby the proceeds from the sale are augmented by reduced subsidies and increased taxes and can help pay off debt or finance social spending. The Mexican privatization program can provide a valuable guide to privatization dos and donts: First, the privatization process must be carefully designed and run in a transparent way. Special requirements such as bans on foreign direct investment or cash-only payments lead to substantial price discounts for firms sold, while simplicity breeds competition and leads to higher prices. A transparent program can also help quell the tendency of politicians to favor their friends by tweaking the rules of the game. Second, restructuring firms prior to privatization is counterproductive in raising net sale prices and should be avoided. Governments spend substantial resources on politically motivated investment or efficiency programs that are not valued by bidders and which can rarely be justified on the social ground on which they are sold. Additionally, restructuring programs lengthen the privatization process considerably and lower prices for firms sold in the case of Mexico, each month of delay reduced the sale price by 2.2 percent. Finally, this paper argues that it is essential to carefully deregulate and re-regulate privatized firms to ensure that they behave appropriately as well as to provide a corporate governance framework to ensure firms are able to finance their operations without relying on the Government for help.

До бібліографії