Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
13 Ergebnisse
Sortierung:
SSRN
In: Journal of Official Statistics, Forthcoming
SSRN
In: Lecture notes in computer science 5262
How can a buyer legitimately benefit from group discounts while preserving his privacy? We show how this can be achieved when buyers can use their own computing device (e.g. smartphone or computer) to perform a purchase. Specifically, we present a protocol for privacy-preserving group discounts. The protocol allows a group of buyers to prove how many they are without disclosing their identities. Coupled with an anonymous payment system, this allows group discounts to be compatible with buyer privacy. ; This work was partly funded by Google through a Faculty Research Award to the first author, who is also partially supported by the Government of Catalonia through an ICREA Acadèmia Prize. The following partial supports are also gratefully acknowledged: the Spanish Government under projects TIN2011-27076-C03-01 "CO-PRIVACY" and CONSOLIDER INGENIO 2010 CSD2007-00004 "ARES", and the European Commission under FP7 projects "DwB" and "Inter-Trust".
BASE
In: Lecture notes in computer science 6344
Part 11: Privacy II ; International audience ; We consider the following problem: two parties have each a private function, for example one that outputs the party's preferences on a set of alternatives; they wish to compute the distance between their functions without any of the parties revealing its function to the other. The above problem is extremely important in the context of social, political or business networks, whenever one wishes to find friends or partners with similar interests without having to disclose one's interests to everyone. We provide protocols that solve the above problem for several types of functions. Experimental work demonstrates that privacy preservation does not significantly distort the computed distances.
BASE
In: Modeling Decisions for Artificial Intelligence; Lecture Notes in Computer Science, S. 252-259
Vehicular ad hoc networks (VANETs) allow vehicle-to-vehicle communication and, in particular, vehicle-generated announcements. Provided that the trustworthiness of such announcements can be guaranteed, they can greatly increase the safety of driving. A new system for vehicle-generated announcements is presented that is secure against external and internal attackers attempting to send fake messages. Internal attacks are thwarted by using an endorsement mechanism based on threshold signatures. Our system outperforms previous proposals in message length and computational cost. Three different privacy-preserving variants of the system are also described to ensure that vehicles volunteering to generate and/or endorse trustworthy announcements do not have to sacrifice their privacy. ; This work was partly supported by the Spanish Government through projects TSI2007-65406-C03-01 "E-AEGIS" and CONSOLIDER INGENIO 2010 CSD2007- 00004 "ARES", and by the Government of Catalonia under grant 2005 SGR 00446.
BASE
Wireless Sensor Networks (WSN) are formed by nodes with limited computational and power resources. WSNs are finding an increasing number of applications, both civilian and military, most of which require security for the sensed data being collected by the base station from remote sensor nodes. In addition, when many sensor nodes transmit to the base station, the implosion problem arises. Providing security measures and implosion-resistance in a resource-limited environment is a real challenge. This article reviews the aggregation strategies proposed in the literature to handle the bandwidth and security problems related to many-to-one transmission in WSNs. Recent contributions to secure lossless many-to-one communication developed by the authors in the context of several Spanish-funded projects are surveyed. Ongoing work on the secure lossy many-to-one communication is also sketched.
BASE
In: Lecture notes in computer science 3885
The pervasive use of information and communication technology (ICT) in modern societies enables countless opportunities for individuals, institutions, businesses and scientists, but also raises difficult ethical and social problems. In particular, ICT helped to make societies more complex and thus harder to understand, which impedes social and political interventions to avoid harm and to increase the common good. To overcome this obstacle, the large-scale EU flagship proposal FuturICT intends to create a platform for accessing global human knowledge as a public good and instruments to increase our understanding of the information society by making use of ICT-based research. In this contribution, we outline the ethical justification for such an endeavor. We argue that the ethical issues raised by FuturICT research projects overlap substantially with many of the known ethical problems emerging from ICT use in general. By referring to the notion of Value Sensitive Design, we show for the example of privacy how this core value of responsible ICT can be protected in pursuing research in the framework of FuturICT. In addition, we discuss further ethical issues and outline the institutional design of FuturICT allowing to address them.
BASE
In: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-376732
A fuller understanding of the human brain, better diagnoses and treatment of brain disorders, as well as the development of new brain-like technologies are all goals of the Human Brain Project. Realizing these goals requires the collection, storage, curation, and analysis of data of various sorts over extended periods of time. Securing privacy interests and advancing data protection measures are key concerns of the Human Brain Project. Their importance was recognized during the proposal development, taken up by the Ethics and Society Subproject (SP12) and reinforced by the Ethics Review in Jan 2015. The HBP needs to comply with national and European data protection legislation. But it is clear that the HBP must go beyond existing legal protections and show not only that it is ethically sensitive to privacy concerns even when such concerns fall outside regulatory frameworks, but also that it makes appropriate use of data and is able to identify and respond to new, unanticipated threats to privacy as they emerge. This document expresses the opinion concerning data protection and privacy by those involved in the Ethics and Society section of the HBP. This includes the members of the sub-project on Ethics and Society (SP12), members of the Ethics Advisory Board and the Ethics Rapporteurs. We identify some of the main privacy-related concerns within HBP, articulate the basic ethical principles that should guide examination of the issues, and present a brief review of the history of data protection and regulation in Europe, focusing on the current state of such regulation. While aware that misuse of the information must be prevented, we are mindful that a form of privacy protection that would prohibit use of any medical or other records for research would stifle medical and scientific progress making it impossible to achieve expected benefits to health that are in the public interest. Therefore, we offer final recommendations that are intended to minimize potential risks while securing the public benefit anticipated from HBP research. Finally, it is worth noting that there is a more general context to current debates on data protection and privacy. A variety of well publicised events have revealed the extent to which the security apparatuses of different national states acquire covert access to data stored on the internet and mine it in various ways in the course of their work. These revelations influence how citizens think about and how policymakers legislate data protection. The structure of the the Opinion is as follows: it starts with a description of some of the key privacy challenges and concerns raised by the HBP. The Opinion then describes conceptual and empirical research on privacy and data protection undertaken in the context of the HBP. It outlines technical options and the regulatory environment within which the HBP operates. The Opinion concludes with a set of recommendations to the HBP.
BASE
In: Wiley series in survey methodology
In: Wiley online library
"This handbook provides technical guidance on statistical disclosure control and on how to approach the problem of balancing the need to provide users with statistical outputs and the need to protect the confidentiality of respondents. Statistical disclosure control is combined with other tools such as administrative, legal and IT in order to define a proper data dissemination strategy based on a risk management approach. The key concepts of statistical disclosure control are presented, along with the methodology and software that can be used to apply various methods of statistical disclosure control. Examples will also be used to illustrate methods described in the book. The handbook is based upon material prepared by the leading National Institute of Statistics in Europe. The context is relevant globally, not just within the EU."--