Protecting privacy while revealing data

被引:0
|
作者
Bernardo A. Huberman
Tad Hogg
机构
[1] HP fellow and director and Tad Hogg is research scientist,
[2] HP Laboratories,undefined
来源
Nature Biotechnology | 2002年 / 20卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:332 / 332
相关论文
共 50 条
  • [41] THE DATA PROTECTION BILL - PROTECTING PRIVACY OR PROMOTING COMMERCE
    MELLORS, C
    POLLITT, D
    [J]. POLITICAL QUARTERLY, 1984, 55 (03): : 308 - 313
  • [42] Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption
    Wang, Chuanyin
    Ma, Cunqing
    Li, Min
    Gao, Neng
    Zhang, Yifei
    Shen, Zhuoxiang
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 95 - 109
  • [43] Protecting data privacy in private information retrieval schemes
    Gertner, Y
    Ishai, Y
    Kushilevitz, E
    Malkin, T
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 60 (03) : 592 - 629
  • [44] A deterministic approach for protecting privacy in sensitive personal data
    Demetris Avraam
    Elinor Jones
    Paul Burton
    [J]. BMC Medical Informatics and Decision Making, 22
  • [45] Protecting farmers' data privacy and confidentiality: Recommendations and considerations
    Kaur, Jasmin
    Fard, Seyed Mehdi Hazrati
    Amiri-Zarandi, Mohammad
    Dara, Rozita
    [J]. FRONTIERS IN SUSTAINABLE FOOD SYSTEMS, 2022, 6
  • [46] Who owns the data? Protecting privacy by sharing openly
    Campbell, J
    [J]. BEHAVIORAL HEALTHCARE TOMORROW, 1996, 5 (06): : 49 - 51
  • [47] A deterministic approach for protecting privacy in sensitive personal data
    Avraam, Demetris
    Jones, Elinor
    Burton, Paul
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2022, 22 (01)
  • [48] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [49] Privacy in multimedia communications: Protecting users, not just data
    Adams, A
    Sasse, MA
    [J]. PEOPLE AND COMPUTERS XV - INTERACTION WITHOUT FRONTIERS, 2001, : 49 - 64
  • [50] Protecting Outsourced Data Privacy with Lifelong Policy Carrying
    Wang, Xiaoguang
    Yong, Qi
    Dai, Yuehua
    Ren, Jianbao
    Hang, Zhang
    [J]. 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 896 - 905