Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes
Data is a valuable asset for the success of business and organizations these days, as it is
effectively utilized for decision making, risk assessment, prioritizing the goals and …
effectively utilized for decision making, risk assessment, prioritizing the goals and …
TrustCloud: A framework for accountability and trust in cloud computing
The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by
potential customers. While preventive controls for security and privacy are actively …
potential customers. While preventive controls for security and privacy are actively …
A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud
Cloud computing provides massive computation power and storage capacity which enable
users to deploy computation and data-intensive applications without infrastructure …
users to deploy computation and data-intensive applications without infrastructure …
Differential privacy: Now it's getting personal
Differential privacy provides a way to get useful information about sensitive data without
revealing much about any one individual. It enjoys many nice compositionality properties not …
revealing much about any one individual. It enjoys many nice compositionality properties not …
Development of a non-grounded haptic interface using the gyro effect
H Yano, M Yoshie, H Iwata - 11th Symposium on Haptic …, 2003 - ieeexplore.ieee.org
In this paper, we propose a technique capable of generating haptic sensation in a human-
scale virtual reality environment or in an augmented reality environment. To realize such a …
scale virtual reality environment or in an augmented reality environment. To realize such a …
Data is the new oil–sort of: a view on why this comparison is misleading and its implications for modern data administration
C Stach - Future Internet, 2023 - mdpi.com
Currently, data are often referred to as the oil of the 21st century. This comparison is not only
used to express that the resource data are just as important for the fourth industrial …
used to express that the resource data are just as important for the fourth industrial …
Application of provenance in social computing: A case study
Complex systems such as Collective Adaptive Systems that include a variety of resources,
are increasingly being designed to include people in task‐execution. Collectives …
are increasingly being designed to include people in task‐execution. Collectives …
Security and data accountability in distributed systems: A provenance survey
While provenance research is common in distributed systems, many proposed solutions do
not address the security of systems and accountability of data stored in those systems. In this …
not address the security of systems and accountability of data stored in those systems. In this …
A formal framework for provenance security
J Cheney - 2011 IEEE 24th Computer Security Foundations …, 2011 - ieeexplore.ieee.org
Provenance, or information about the origin, derivation, or history of data, is becoming an
important topic especially for shared scientific or public data on the Web. It clearly has …
important topic especially for shared scientific or public data on the Web. It clearly has …