WorldWideScience

Sample records for model privacy form

  1. 12 CFR 332.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section 332.2 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a)...

  2. 12 CFR Appendix A to Part 216 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... translated into languages other than English. C. Information Required in the Model Privacy Form The... bulleted list: income; account balances; payment history; transaction history; transaction or loss history; credit history; credit scores; assets; investment experience; credit-based insurance scores;...

  3. 12 CFR Appendix A to Part 573 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... languages other than English. C. Information Required in the Model Privacy Form The information in the model...; account balances; payment history; transaction history; transaction or loss history; credit history; credit scores; assets; investment experience; credit-based insurance scores; insurance claim...

  4. 17 CFR Appendix A to Part 160 - Model Privacy Form

    Science.gov (United States)

    2010-04-01

    ... languages other than English. C. Information Required in the Model Privacy Form The information in the model...; account balances; payment history; transaction history; transaction or loss history; credit history; credit scores; assets; investment experience; credit-based insurance scores; insurance claim...

  5. 12 CFR Appendix A to Part 716 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... languages other than English. C. Information Required in the Model Privacy Form The information in the model...; account balances; payment history; transaction history; transaction or loss history; credit history; credit scores; assets; investment experience; credit-based insurance scores; insurance claim...

  6. 16 CFR Appendix A to Part 313 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... color. (e) Languages. The model form may be translated into languages other than English. C. Information...; payment history; transaction history; transaction or loss history; credit history; credit scores; assets; investment experience; credit-based insurance scores; insurance claim history; medical information;...

  7. Space Partitioning for Privacy Enabled 3D City Models

    Science.gov (United States)

    Filippovska, Y.; Wichmann, A.; Kada, M.

    2016-10-01

    Due to recent technological progress, data capturing and processing of highly detailed (3D) data has become extensive. And despite all prospects of potential uses, data that includes personal living spaces and public buildings can also be considered as a serious intrusion into people's privacy and a threat to security. It becomes especially critical if data is visible by the general public. Thus, a compromise is needed between open access to data and privacy requirements which can be very different for each application. As privacy is a complex and versatile topic, the focus of this work particularly lies on the visualization of 3D urban data sets. For the purpose of privacy enabled visualizations of 3D city models, we propose to partition the (living) spaces into privacy regions, each featuring its own level of anonymity. Within each region, the depicted 2D and 3D geometry and imagery is anonymized with cartographic generalization techniques. The underlying spatial partitioning is realized as a 2D map generated as a straight skeleton of the open space between buildings. The resulting privacy cells are then merged according to the privacy requirements associated with each building to form larger regions, their borderlines smoothed, and transition zones established between privacy regions to have a harmonious visual appearance. It is exemplarily demonstrated how the proposed method generates privacy enabled 3D city models.

  8. The Infopriv model for information privacy

    OpenAIRE

    2012-01-01

    D.Phil. (Computer Science) The privacy of personal information is crucial in today's information systems. Traditional security models are mainly concerned with the protection of information inside a computer system. These models assume that the users of a computer system are trustworthy and will not disclose information to unauthorised parties. However, this assumption does not always apply to information privacy since people are the major cause of privacy violations. Alternative models ar...

  9. Privacy Enhanced Pervasive Computing Model with Dynamic Trust and Security

    Directory of Open Access Journals (Sweden)

    Geetha Mariappan

    2014-06-01

    Full Text Available The objective of the research work is to propose a policy aware privacy enhancement model using dynamic trust and security management techniques. The different polices of the stakeholders incorporating device manufacturer, service provider, Mobile agents and mobile users are considered to achieve an enhanced privacy for on-demand request. The entities involving direct and indirect trust establishment with all forms of uncertainties like DDoS attacks are considered along with multiple layers of security management operations across varying trusted entities. The focus is to enhance the existing privacy through an efficient, preventive, detective, response mechanisms for those attacks, which will address the problem of DDoS before, during and after an actual attack. The session time and access time are controlled by the privileges and rights for disclosure of information in pervasive environment.

  10. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  11. A Privacy Model for RFID Tag Ownership Transfer

    Directory of Open Access Journals (Sweden)

    Xingchun Yang

    2017-01-01

    Full Text Available The ownership of RFID tag is often transferred from one owner to another in its life cycle. To address the privacy problem caused by tag ownership transfer, we propose a tag privacy model which captures the adversary’s abilities to get secret information inside readers, to corrupt tags, to authenticate tags, and to observe tag ownership transfer processes. This model gives formal definitions for tag forward privacy and backward privacy and can be used to measure the privacy property of tag ownership transfer scheme. We also present a tag ownership transfer scheme, which is privacy-preserving under the proposed model and satisfies the other common security requirements, in addition to achieving better performance.

  12. Modelling information dissemination under privacy concerns in social media

    Science.gov (United States)

    Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui

    2016-05-01

    Social media has recently become an important platform for users to share news, express views, and post messages. However, due to user privacy preservation in social media, many privacy setting tools are employed, which inevitably change the patterns and dynamics of information dissemination. In this study, a general stochastic model using dynamic evolution equations was introduced to illustrate how privacy concerns impact the process of information dissemination. Extensive simulations and analyzes involving the privacy settings of general users, privileged users, and pure observers were conducted on real-world networks, and the results demonstrated that user privacy settings affect information differently. Finally, we also studied the process of information diffusion analytically and numerically with different privacy settings using two classic networks.

  13. Privacy Preservation in Role-based Access Control Model

    Directory of Open Access Journals (Sweden)

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  14. Towards a Formal Model of Privacy-Sensitive Dynamic Coalitions

    CERN Document Server

    Bab, Sebastian; 10.4204/EPTCS.83.2

    2012-01-01

    The concept of dynamic coalitions (also virtual organizations) describes the temporary interconnection of autonomous agents, who share information or resources in order to achieve a common goal. Through modern technologies these coalitions may form across company, organization and system borders. Therefor questions of access control and security are of vital significance for the architectures supporting these coalitions. In this paper, we present our first steps to reach a formal framework for modeling and verifying the design of privacy-sensitive dynamic coalition infrastructures and their processes. In order to do so we extend existing dynamic coalition modeling approaches with an access-control-concept, which manages access to information through policies. Furthermore we regard the processes underlying these coalitions and present first works in formalizing these processes. As a result of the present paper we illustrate the usefulness of the Abstract State Machine (ASM) method for this task. We demonstrate...

  15. PRIVACY CONCERNS AND ONLINE PURCHASING BEHAVIOUR: TOWARDS AN INTEGRATED MODEL

    Directory of Open Access Journals (Sweden)

    Fortes, Nuno

    2016-09-01

    Full Text Available This study aims to analyze how privacy concerns about the Internet have an impact on the consumers intention to make online purchases. A research model was developed establishing that this impact takes place via the connection of privacy concerns with the theories of trust and risk, the theory of planned behaviour and the technology acceptance model. The empirical study was based on an online survey that collected data from 900 individuals. The results confirmed the acceptance of all proposed hypotheses and the overall validation of the research model. Implications and further research suggestions are presented.

  16. The Impact of Privacy Concerns and Perceived Vulnerability to Risks on Users Privacy Protection Behaviors on SNS: A Structural Equation Model

    Directory of Open Access Journals (Sweden)

    Noora Sami Al-Saqer

    2016-05-01

    Full Text Available This research paper investigates Saudi users’ awareness levels about privacy policies in Social Networking Sites (SNSs, their privacy concerns and their privacy protection measures. For this purpose, a research model that consists of five main constructs namely information privacy concern, awareness level of privacy policies of social networking sites, perceived vulnerability to privacy risks, perceived response efficacy, and privacy protecting behavior was developed. An online survey questionnaire was used to collect responses from a sample of (108 Saudi SNSs users. The study found that Saudi users of social networking sites are concerned about their information privacy, but they do not have enough awareness of the importance of privacy protecting behaviors to safeguard their privacy online. The research results also showed that there is a lack of awareness of privacy policies of Social networking sites among Saudi users. Testing hypothesis results using the Structural Equation Modeling (SEM showed that information privacy concern positively affects privacy protection behaviors in SNSs and perceived vulnerability to privacy risks positively affects information privacy concern.

  17. Model-driven Privacy Assessment in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Knirsch, Fabian [Salzburg Univ. (Austria); Engel, Dominik [Salzburg Univ. (Austria); Neureiter, Christian [Salzburg Univ. (Austria); Frincu, Marc [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2015-02-09

    In a smart grid, data and information are transported, transmitted, stored, and processed with various stakeholders having to cooperate effectively. Furthermore, personal data is the key to many smart grid applications and therefore privacy impacts have to be taken into account. For an effective smart grid, well integrated solutions are crucial and for achieving a high degree of customer acceptance, privacy should already be considered at design time of the system. To assist system engineers in early design phase, frameworks for the automated privacy evaluation of use cases are important. For evaluation, use cases for services and software architectures need to be formally captured in a standardized and commonly understood manner. In order to ensure this common understanding for all kinds of stakeholders, reference models have recently been developed. In this paper we present a model-driven approach for the automated assessment of such services and software architectures in the smart grid that builds on the standardized reference models. The focus of qualitative and quantitative evaluation is on privacy. For evaluation, the framework draws on use cases from the University of Southern California microgrid.

  18. 隐私保护的信息熵模型及其度量方法∗%Information Entropy Models and Privacy Metrics Methods for Privacy Protection

    Institute of Scientific and Technical Information of China (English)

    彭长根; 丁红发; 朱义杰; 田有亮; 符祖峰

    2016-01-01

    The quantification of privacy plays an important role in the privacy protection. Information entropy as a quantitative method of information can be used to solve the problem of privacy measurement. In order to realize the privacy metrics, several models of privacy information entropy are proposed based on Shannon’s Information Theory. These models include the basic information entropy model of privacy protection, the information entropy model of privacy protection with adversary, the information entropy model of privacy protection with subjective feelings and multi-source information entropy model of privacy protection. In these models, the information owner is assumed to be the sender, privacy attacker is assumed as to be the recipient, and the privacy disclosure course can be regarded as a communication channel. Based on these assumptions, the entropy,mutual information, conditional entropy, and conditional mutual information are introduced to represent measurement of privacy, privacy disclosure, and privacy and disclosure with background knowledge for the privacy protection system. Furthermore, the quantitative evaluation of privacy protection strength and adversary ability is provided to support quantitative risk assessment for privacy disclosure. Finally, the specific information entropy model, measurement and analysis of privacy protection algorithms, and adversary ability are supplied for location privacy protection application. The proposed models and privacy metrics can be used as fundamental theory for the privacy protection technology and privacy disclosure risk assessment.%隐私的量化是隐私保护技术的重要支撑,信息熵作为信息的量化手段,自然可以用于解决隐私度量问题。基于Shannon信息论的通信框架,提出了几种隐私保护信息熵模型,以解决隐私保护系统的相关度量问题,主要包括:隐私保护基本信息熵模型、含敌手攻击的隐私保护信息熵模型、带主观

  19. The Structures of Centralized Governmental Privacy Protection: Approaches, Models, and Analysis.

    Science.gov (United States)

    Jaeger, Paul T.; McClure, Charles R.; Fraser, Bruce T.

    2002-01-01

    Asserts that the federal government should adopt a centralized governmental structure for the privacy protection of personal information and data. Discusses the roles of federal law, federal agencies, and the judiciary; the concept of information privacy; the impact of current technologies; and models of centralized government structures for…

  20. A Privacy Data-Oriented Hierarchical MapReduce Programming Model

    Directory of Open Access Journals (Sweden)

    Haiwen Han

    2013-08-01

    Full Text Available To realize privacy data protection efficiently in hybrid cloud service, a hierarchical control architecture based multi-cluster MapReduce programming model (the Hierarchical MapReduce Model,HMR is presented. Under this hierarchical control architecture,  data isolation and placement among private cloud and public clouds according to the data privacy characteristic is implemented by the control center in private cloud.  And then, to perform the corresponding distributed parallel computation correctly under the multi-clusters mode that is different to the conventional single-cluster mode, the Map-Reduce-GlobalReduce three stage scheduling process is designed. Limiting the computation about privacy data in private cloud while outsourcing the computation about non-privacy data to public clouds as much as possible, HMR reaches the performance of both security and low cost.  

  1. A Privacy Preservation Model for Health-Related Social Networking Sites.

    Science.gov (United States)

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  2. A Privacy Preservation Model for Health-Related Social Networking Sites

    Science.gov (United States)

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  3. Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling.

    Science.gov (United States)

    Croll, Peter R

    2011-02-01

    To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to analyse their Privacy and Security policies can benefit from guidance provided by outside entities such as the Privacy Office of their State or Government together with law firms and ICT specialists. The advice given is not uniform and often open to different interpretations. Of greater concern is the possibility of overlooking any important aspects that later result in a data breach. Based on three case studies, this paper considers whether a more formal approach to privacy analysis could be taken that would help identify the full coverage of a Privacy Impact Analysis and determine the deficiencies with an organisation's current policies and approach. A diagrammatic model showing the relationships between Confidentiality, Privacy, Trust, Security and Safety is introduced. First the validity of this model is determined by mapping it against the real-world case studies taken from three healthcare services that depend on ICT. Then, by using software engineering methods, a formal mapping of the relationships is undertaken to identify a full set of policies needed to satisfy the model. How effective this approach may prove as a generic method for deriving a comprehensive set of policies in health ICT applications is finally discussed.

  4. A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network

    Directory of Open Access Journals (Sweden)

    Jundong Chen

    2014-05-01

    Full Text Available Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the networks. While a variety of factors have been shown to affect the privacy strategies of these users, very little work has been done in analyzing how these factors influence each other and collectively contribute towards the users’ privacy strategies. In this paper, we analyze the influence of attribute importance, benefit, risk and network topology on the users’ attribute disclosure behavior by introducing a weighted evolutionary game model. Results show that: irrespective of risk, users aremore likely to reveal theirmost important attributes than their least important attributes; when the users’ range of influence is increased, the risk factor plays a smaller role in attribute disclosure; the network topology exhibits a considerable effect on the privacy in an environment with risk.

  5. A typology of privacy

    NARCIS (Netherlands)

    Koops, Bert Jaap; Newell, Bryce; Timan, Tjerk; Skorvánek, Ivan; Chokrevski, Tomislav; Galič, Maša

    2017-01-01

    Despite the difficulty of capturing the nature and boundaries of privacy, it is important to conceptualize it. Some scholars develop unitary theories of privacy in the form of a unified conceptual core; others offer classifications of privacy that make meaningful distinctions between different types

  6. Development and Analyses of Privacy Management Models in Online Social Networks Based on Communication Privacy Management Theory

    Science.gov (United States)

    Lee, Ki Jung

    2013-01-01

    Online social networks (OSNs), while serving as an emerging means of communication, promote various issues of privacy. Users of OSNs encounter diverse occasions that lead to invasion of their privacy, e.g., published conversation, public revelation of their personally identifiable information, and open boundary of distinct social groups within…

  7. Development and Analyses of Privacy Management Models in Online Social Networks Based on Communication Privacy Management Theory

    Science.gov (United States)

    Lee, Ki Jung

    2013-01-01

    Online social networks (OSNs), while serving as an emerging means of communication, promote various issues of privacy. Users of OSNs encounter diverse occasions that lead to invasion of their privacy, e.g., published conversation, public revelation of their personally identifiable information, and open boundary of distinct social groups within…

  8. 12 CFR Appendix A to Part 332 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... information to market to me.” A financial institution that chooses to offer an opt-out for joint marketing... institutions to jointly market to me.” (h) Barcodes. A financial institution may elect to include a barcode and..., at the option of a financial institution, including a group of financial institutions that......

  9. 12 CFR Appendix A to Part 40 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... market to me.” (4) Nonaffiliate opt-out. If the financial institution shares personal information... market to me.” or “□ Do not use my personal information to market to me.” A financial institution that... personal information with other financial institutions to jointly market to me.” (h) Barcodes. A...

  10. Model-based Assessment for Balancing Privacy Requirements and Operational Capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Knirsch, Fabian [Salzburg Univ. (Austria); Engel, Dominik [Salzburg Univ. (Austria); Frincu, Marc [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2015-02-17

    The smart grid changes the way energy is produced and distributed. In addition both, energy and information is exchanged bidirectionally among participating parties. Therefore heterogeneous systems have to cooperate effectively in order to achieve a common high-level use case, such as smart metering for billing or demand response for load curtailment. Furthermore, a substantial amount of personal data is often needed for achieving that goal. Capturing and processing personal data in the smart grid increases customer concerns about privacy and in addition, certain statutory and operational requirements regarding privacy aware data processing and storage have to be met. An increase of privacy constraints, however, often limits the operational capabilities of the system. In this paper, we present an approach that automates the process of finding an optimal balance between privacy requirements and operational requirements in a smart grid use case and application scenario. This is achieved by formally describing use cases in an abstract model and by finding an algorithm that determines the optimum balance by forward mapping privacy and operational impacts. For this optimal balancing algorithm both, a numeric approximation and – if feasible – an analytic assessment are presented and investigated. The system is evaluated by applying the tool to a real-world use case from the University of Southern California (USC) microgrid.

  11. Privacy versus autonomy: a tradeoff model for smart home monitoring technologies.

    Science.gov (United States)

    Townsend, Daphne; Knoefel, Frank; Goubran, Rafik

    2011-01-01

    Smart homes are proposed as a new location for the delivery of healthcare services. They provide healthcare monitoring and communication services, by using integrated sensor network technologies. We validate a hypothesis regarding older adults' adoption of home monitoring technologies by conducting a literature review of articles studying older adults' attitudes and perceptions of sensor technologies. Using current literature to support the hypothesis, this paper applies the tradeoff model to decisions about sensor acceptance. Older adults are willing to trade privacy (by accepting a monitoring technology), for autonomy. As the information captured by the sensor becomes more intrusive and the infringement on privacy increases, sensors are accepted if the loss in privacy is traded for autonomy. Even video cameras, the most intrusive sensor type were accepted in exchange for the height of autonomy which is to remain in the home.

  12. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... encouraging further institutional collaboration and acceptance of citizens’ informational self-determination....

  13. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    Science.gov (United States)

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  14. Building a Privacy Model in the Business Processes of the Enterprise: An Information Systems Design Science Research

    Directory of Open Access Journals (Sweden)

    Munir Majdalawieh

    2013-08-01

    Full Text Available Privacy has not been researched or investigated from business process management perspective and the current literature has shown lack of a well-defined methodology for integrating privacy into business processes. This paper proposes an integrated privacy model. Such model is an integral part of the organization’s enterprise to ensure that personal data protection is impeded in the business processes of any system that is involved in collecting, disseminating, and accessing an individual’s data. Passing privacy laws is very essential and requires some cooperation and partnership between nations based on some privacy principles. The proposed framework is built on these principles and will help organizations to develop data protection in their business processes, assess the privacy issues in their organization, protect the interest of their clients, advance their value proposition, and make it easier to identify the impact of privacy on their business. The study follows the design science research process and the information systems design science research (ISDSR methodologies by identifying relevant problems from the current literature, defining the objectives of the study, designing and developing the ABC-PDMS model, and evaluating the model.

  15. A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Changlun Zhang

    2015-01-01

    Full Text Available With the rapid development and widespread use of wearable wireless sensors, data aggregation technique becomes one of the most important research areas. However, the sensitive data collected by sensor nodes may be leaked at the intermediate aggregator nodes. So, privacy preservation is becoming an increasingly important issue in security data aggregation. In this paper, we propose a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure. Data integrity is verified both at cluster head and at base station. Some nodes adopt slicing technology to avoid the leak of data at the cluster head in inner-cluster. Furthermore, a mechanism is given to locate the compromised nodes. The analysis shows that the model is robust to many attacks and has a lower communication overhead.

  16. Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Nileema S. Gawande

    2013-01-01

    Full Text Available In the today’s fast growing world, use of internet is increasing popularly and at the same time Location-based services (LBS are also getting more popular. LBS providers require user’s current locations to answer their location-based queries. The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual. This objective is achieved by simulating locally cloak algorithm and globally cloak algorithm for Manhattan mobility model and Waypoint mobility model using NS-2.34 environment. In the experiments, to hide the user’s current locations in rectangle [bounding box] according to users privacy need, obfuscation and k-anonymity strategies are used.

  17. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  18. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  19. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  20. Ensuring Data Security And Privacy In Cloud Computing Through Transparency as Service Model

    Directory of Open Access Journals (Sweden)

    Afzaal Ahmad

    2014-09-01

    Full Text Available Cloud Computing is hot technology in computer world today. Its getting popular because its inexpensive, provides on demand access when and where needed. It also removes technical staff requirements for maintaining the infrastructure because that is done on the provider side thus significantly reducing organizational costs. It also provides opportunity for scientists to use powerful computing resources for research purposes which are very expensive on rent bases which they normally would not have been able to use due to cost factors.But with these features it has certain problems that discredit the service one of major problems is Data Security and Privacy.Since the only party that has physical access to data storage is provider and to keep track of where data is stored for certain users the providers keep meta-data in their own databases it creates a security and data privacy issue.If meta-data is compromised than unauthorized access to user data is possible.This paper proposes a Transparency Service Model to insure security and privacy of the user data.

  1. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  2. A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes

    OpenAIRE

    Jung, Ho-Won; El Emam, Khaled

    2014-01-01

    Background A linear programming (LP) model was proposed to create de-identified data sets that maximally include spatial detail (e.g., geocodes such as ZIP or postal codes, census blocks, and locations on maps) while complying with the HIPAA Privacy Rule’s Expert Determination method, i.e., ensuring that the risk of re-identification is very small. The LP model determines the transition probability from an original location of a patient to a new randomized location. However, it has a limitati...

  3. BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD

    Directory of Open Access Journals (Sweden)

    Ali Gholami

    2016-01-01

    Full Text Available Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud computing as an enabler provides scalable resources and significant economic benefits in the form of reduced operational costs. This paradigm raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. This paper reviews the existing technologies and a wide array of both earlier and state-ofthe-art projects on cloud security and privacy. We categorize the existing research according to the cloud reference architecture orchestration, resource control, physical resource, and cloud service management layers, in addition to reviewing the recent developments for enhancing the Apache Hadoop security as one of the most deployed big data infrastructures. We also outline the frontier research on privacy-preserving data-intensive applications in cloud computing such as privacy threat modeling and privacy enhancing solutions.

  4. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  5. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model.

    NARCIS (Netherlands)

    Kuchinke, W.; Ohmann, C.; Verheij, R.A.; Veen, E.B. van; Arvanitis, T.N.; Taweel, A.; Delaney, B.C.

    2014-01-01

    Purpose: To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data priva

  6. Location Privacy

    Science.gov (United States)

    Meng, Xiaofeng; Chen, Jidong

    With rapid development of sensor and wireless mobile devices, it is easy to access mobile users' location information anytime and anywhere. On one hand, LBS is becoming more and more valuable and important. On the other hand, location privacy issues raised by such applications have also gained more attention. However, due to the specificity of location information, traditional privacy-preserving techniques in data publishing cannot be used. In this chapter, we will introduce location privacy, and analyze the challenges of location privacy-preserving, and give a survey of existing work including the system architecture, location anonymity and query processing.

  7. COINSTAC: A Privacy Enabled Model and Prototype for Leveraging and Processing Decentralized Brain Imaging Data

    Science.gov (United States)

    Plis, Sergey M.; Sarwate, Anand D.; Wood, Dylan; Dieringer, Christopher; Landis, Drew; Reed, Cory; Panta, Sandeep R.; Turner, Jessica A.; Shoemaker, Jody M.; Carter, Kim W.; Thompson, Paul; Hutchison, Kent; Calhoun, Vince D.

    2016-01-01

    The field of neuroimaging has embraced the need for sharing and collaboration. Data sharing mandates from public funding agencies and major journal publishers have spurred the development of data repositories and neuroinformatics consortia. However, efficient and effective data sharing still faces several hurdles. For example, open data sharing is on the rise but is not suitable for sensitive data that are not easily shared, such as genetics. Current approaches can be cumbersome (such as negotiating multiple data sharing agreements). There are also significant data transfer, organization and computational challenges. Centralized repositories only partially address the issues. We propose a dynamic, decentralized platform for large scale analyses called the Collaborative Informatics and Neuroimaging Suite Toolkit for Anonymous Computation (COINSTAC). The COINSTAC solution can include data missing from central repositories, allows pooling of both open and “closed” repositories by developing privacy-preserving versions of widely-used algorithms, and incorporates the tools within an easy-to-use platform enabling distributed computation. We present an initial prototype system which we demonstrate on two multi-site data sets, without aggregating the data. In addition, by iterating across sites, the COINSTAC model enables meta-analytic solutions to converge to “pooled-data” solutions (i.e., as if the entire data were in hand). More advanced approaches such as feature generation, matrix factorization models, and preprocessing can be incorporated into such a model. In sum, COINSTAC enables access to the many currently unavailable data sets, a user friendly privacy enabled interface for decentralized analysis, and a powerful solution that complements existing data sharing solutions. PMID:27594820

  8. Privacy lost - and found? The information value chain as a model to meet citizens' concerns

    NARCIS (Netherlands)

    Pas, van de John; Bussel, van Geert-Jan

    2015-01-01

    In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effective in providing privacy to citizens. Rapid development of ubiquitous computing and ‘the internet of things’ are leading to Big Data and the application of Predictive Analytics, effectively merging the

  9. A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes

    Science.gov (United States)

    2014-01-01

    Background A linear programming (LP) model was proposed to create de-identified data sets that maximally include spatial detail (e.g., geocodes such as ZIP or postal codes, census blocks, and locations on maps) while complying with the HIPAA Privacy Rule’s Expert Determination method, i.e., ensuring that the risk of re-identification is very small. The LP model determines the transition probability from an original location of a patient to a new randomized location. However, it has a limitation for the cases of areas with a small population (e.g., median of 10 people in a ZIP code). Methods We extend the previous LP model to accommodate the cases of a smaller population in some locations, while creating de-identified patient spatial data sets which ensure the risk of re-identification is very small. Results Our LP model was applied to a data set of 11,740 postal codes in the City of Ottawa, Canada. On this data set we demonstrated the limitations of the previous LP model, in that it produces improbable results, and showed how our extensions to deal with small areas allows the de-identification of the whole data set. Conclusions The LP model described in this study can be used to de-identify geospatial information for areas with small populations with minimal distortion to postal codes. Our LP model can be extended to include other information, such as age and gender. PMID:24885457

  10. DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTURES – WEB SERVICES CASE STUDY

    Directory of Open Access Journals (Sweden)

    M.Upendra Kumar

    2011-07-01

    Full Text Available Software Engineering covers the definition of processes, techniques and models suitable for its environment to guarantee quality of results. An important design artifact in any software development project is the Software Architecture. Software Architecture’s important part is the set of architectural design rules. A primary goal of the architecture is to capture the architecture design decisions. An important part of these design decisions consists of architectural design rules In an MDA (Model-Driven Architecture context, the design of the system architecture is captured in the models of the system. MDA is known to be layered approach for modeling the architectural design rules and uses design patterns to improve the quality of software system. And to include the security to the software system, security patterns are introduced that offer security at the architectural level. More over, agile software development methods are used to build secure systems. There are different methods defined in agile development as extreme programming (XP, scrum, feature driven development (FDD, test driven development (TDD, etc. Agile processing is includes the phases as agile analysis, agile design and agile testing. These phases are defined in layers of MDA to provide security at the modeling level which ensures that security at the system architecture stage will improve the requirements for that system. Agile modeled Layered Security Architectures increase the dependability of the architecture in terms of privacy requirements. We validate this with a case study of dependability of privacy of Web Services Security Architectures, which helps for secure service oriented security architecture. In this paper the major part is given to model architectural design rules using MDA so that architects and developers are responsible to automatic enforcement on the detailed design and easy to understand and use by both of them. This MDA approach is implemented in use of

  11. On quantum and approximate privacy

    CERN Document Server

    Klauck, H

    2001-01-01

    This paper studies privacy in communication complexity. The focus is on quantum versions of the model and on protocols with only approximate privacy against honest players. We show that the privacy loss (the minimum divulged information) in computing a function can be decreased exponentially by using quantum protocols, while the class of privately computable functions (i.e., those with privacy loss 0) is not increased by quantum protocols. Quantum communication combined with small information leakage on the other hand makes certain functions computable (almost) privately which are not computable using quantum communication without leakage or using classical communication with leakage. We also give an example of an exponential reduction of the communication complexity of a function by allowing a privacy loss of o(1) instead of privacy loss 0.

  12. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  13. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  14. 48 CFR 52.224-2 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  15. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  16. Privacy in the family

    NARCIS (Netherlands)

    Newell, Bryce; Metoyer, Cheryl A.; Moore, Adam D.

    2015-01-01

    Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics of family relationships. Monitoring, mediated and facilitated by practices of both covert and overt electronic surveillance, has changed the nature of privacy within the family. In thi

  17. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    . There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...

  18. Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version

    Directory of Open Access Journals (Sweden)

    Tapas Pandit

    2016-08-01

    Full Text Available Attribute-Based Signcryption (ABSC is a natural extension of Attribute-Based Encryption (ABE and Attribute-Based Signature (ABS, where one can have the message confidentiality and authenticity together. Since the signer privacy is captured in security of ABS, it is quite natural to expect that the signer privacy will also be preserved in ABSC. In this paper, first we propose an ABSC scheme which is weak existential unforgeable and IND-CCA secure in adaptive-predicates models and, achieves signer privacy. Then, by applying strongly unforgeable one-time signature (OTS, the above scheme is lifted to an ABSC scheme to attain strong existential unforgeability in adaptive-predicates model. Both the ABSC schemes are constructed on common setup, i.e the public parameters and key are same for both the encryption and signature modules. Our first construction is in the flavor of CtE&S paradigm, except one extra component that will be computed using both signature components and ciphertext components. The second proposed construction follows a new paradigm (extension of CtE&S , we call it “Commit then Encrypt and Sign then Sign” (CtE&S . The last signature is generated using a strong OTS scheme. Since, the non-repudiation is achieved by CtE&S paradigm, our systems also achieve the same.

  19. Multiscale friction modeling for sheet metal forming

    NARCIS (Netherlands)

    Hol, J.; Cid Alfaro, M.V.; de Rooij, Matthias B.; Meinders, Vincent T.; Felder, Eric; Montmitonnet, Pierre

    2010-01-01

    The most often used friction model for sheet metal forming simulations is the relative simple Coulomb friction model. This paper presents a more advanced friction model for large scale forming simulations based on the surface change on the micro-scale. The surface texture of a material changes when

  20. 12 CFR 332.7 - Form of opt out notice to consumers; opt out methods.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Form of opt out notice to consumers; opt out methods. 332.7 Section 332.7 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND.... (i) Model privacy form. Pursuant to § 332.2(a) of this part, a model privacy form that meets...

  1. Security and privacy threats in RFID traceability network

    Institute of Scientific and Technical Information of China (English)

    Chu; Chao-Hsien

    2008-01-01

    To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. ...

  2. Privacy Preserving Linear Regression on Distributed Databases

    Directory of Open Access Journals (Sweden)

    Fida K. Dankar

    2015-04-01

    Full Text Available Studies that combine data from multiple sources can tremendously improve the outcome of the statistical analysis. However, combining data from these various sources for analysis poses privacy risks. A number of protocols have been proposed in the literature to address the privacy concerns; however they do not fully deliver on either privacy or complexity. In this paper, we present a (theoretical privacy preserving linear regression model for the analysis of data owned by several sources. The protocol uses a semi-trusted third party and delivers on privacy and complexity.

  3. Modelling of ductile failure in metal forming

    NARCIS (Netherlands)

    Wisselink, H.H.; Huetink, J.

    2009-01-01

    Damage and fracture are important criteria in the design of products and processes. Damage models can be used to predict ductile failure in metal forming processes. Nonlocal models avoid the mesh dependency problems of local damage models. A nonlocal damage model has been implemented in LSDYNA using

  4. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  5. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid softwar

  6. Data privacy foundations, new developments and the big data challenge

    CERN Document Server

    Torra, Vicenç

    2017-01-01

    This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.

  7. 77 FR 60129 - 60-Day Proposed Information Collection: Indian Health Service Forms To Implement the Privacy Rule...

    Science.gov (United States)

    2012-10-02

    ... Office of Management and Budget (OMB) for review. Proposed Collection: Title: 0917-0030, ``IHS Forms to... requirements. The IHS will continue to use the following data collection instruments to meet the information... covered entities to permit individuals to request that the covered entity provide an accounting of...

  8. Common Privacy Myths

    Science.gov (United States)

    ... Health Information home > privacy + phrs > common privacy myths Common Privacy Myths With the new federal laws protecting ... Here are the truths to some of the common myths: Health information cannot be faxed – FALSE Your ...

  9. Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks.

    Science.gov (United States)

    Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu

    2017-05-05

    Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users' medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs' applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs' deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models.

  10. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  11. Mathematical model of cylindrical form tolerance

    Institute of Scientific and Technical Information of China (English)

    蔡敏; 杨将新; 吴昭同

    2004-01-01

    Tolerance is essential for integration of CAD and CAM. Unfortunately, the meaning of tolerances in the national standard is expressed in graphical and language forms and is not adaptable for expression, processing and data transferring with computers. How to interpret its semantics is becoming a focus of relevant studies. This work based on the mathematical definition of form tolerance in ANSI Y 14.5.1 M-1994, established the mathematical model of form tolerance for cylindrical feature. First, each tolerance in the national standard was established by vector equation. Then on the foundation of toler-ance's mathematical definition theory, each tolerance zone's mathematical model was established by inequality based on degrees of feature. At last the variance area of each tolerance zone is derived. This model can interpret the semantics of form tolerance exactly and completely.

  12. Mathematical model of cylindrical form tolerance

    Institute of Scientific and Technical Information of China (English)

    蔡敏; 杨将新; 吴昭同

    2004-01-01

    Tolerance is essential for integration of CAD and CAM.Unfortunately,the meaning of tolerances in the national standard is expressed in graphical and language forms and is not adaptable for expression,processing and data transferring with computers.How to interpret its semantics is becoming a focus of relevant studies.This work based on the mathematical definition of form tolerance in ANSI Y 14.5.1 M-1994,established the mathematical model of form tolerance for cylindrical feature.First,each tolerance in the national standard was established by vector equation.Then on the foundation of tolerance's mathematical definition theory,each tolerance zone's mathematical model was established by inequality based on degrees of feature.At last the variance area of each tolerance zone is derived.This model can interpret the semantics of form tolerance exactly and completely.

  13. Hencky's model for elastomer forming process

    Science.gov (United States)

    Oleinikov, A. A.; Oleinikov, A. I.

    2016-08-01

    In the numerical simulation of elastomer forming process, Henckys isotropic hyperelastic material model can guarantee relatively accurate prediction of strain range in terms of large deformations. It is shown, that this material model prolongate Hooke's law from the area of infinitesimal strains to the area of moderate ones. New representation of the fourth-order elasticity tensor for Hencky's hyperelastic isotropic material is obtained, it possesses both minor symmetries, and the major symmetry. Constitutive relations of considered model is implemented into MSC.Marc code. By calculating and fitting curves, the polyurethane elastomer material constants are selected. Simulation of equipment for elastomer sheet forming are considered.

  14. Quantifying Differential Privacy under Temporal Correlations

    Science.gov (United States)

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  15. Big data privacy: The datafication of personal information

    DEFF Research Database (Denmark)

    Mai, Jens-Erik

    2016-01-01

    In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model......—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy....... This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information...

  16. Internet of Everything (Ioe: Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets

    Directory of Open Access Journals (Sweden)

    Asim Majeed

    2016-03-01

    Full Text Available This paper aims to investigate the effectiveness of the provision of privacy of individuals through privacy enhancing technologies (PETs. The successful evolution and emergence of cyberspace with the real world through “Internet of Everything (IoE” has led to the speedy progress in research and development of predictive analysis of big data. The individual’s privacy has gained a considerable momentum in both industry and academia since privacy-enhancing technologies (PETs constitute a technical means to protect information. Privacy regulations and state of law deemed this as an integral part in order to protect the individual’s private sphere when the infrastructure of Information Communication Technologies (ICT is laid out. Modern organisations use consent forms to gather individual’s sensitive personal information for a specific purpose. The law prohibits using the person’s information for purposes other than that of when the consent was initially established. The infrastructure of ICT should be developed in alliance with the privacy laws and made compliant as well intelligent which learn by itself from the environment. This extra layer embedded in the system would educate the ICT structure and help system to authenticate as well as communicate with the perspective users. The existing literature on protecting individuals’ privacy through privacy-enhancing technologies (PETs is still embryonic and does conclude that the individual’s concerns about privacy are not fully considered in the technological sense. Among other contributions, this research paper will devise a conceptual model to improve individual’s privacy.

  17. Fortified anonymous communication protocol for location privacy in WSN: a modular approach.

    Science.gov (United States)

    Abuzneid, Abdel-Shakour; Sobh, Tarek; Faezipour, Miad; Mahmood, Ausif; James, John

    2015-03-10

    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.

  18. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Directory of Open Access Journals (Sweden)

    Abdel-Shakour Abuzneid

    2015-03-01

    Full Text Available Wireless sensor network (WSN consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc. and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC protocol for WSN.

  19. Extended K-Anonymity Model for Privacy Preserving on Micro Data

    Directory of Open Access Journals (Sweden)

    Masoud Rahimi

    2015-11-01

    Full Text Available Today, information collectors, particularly statistical organizations, are faced with two conflicting issues. On one hand, according to their natural responsibilities and the increasing demand for the collected data, they are committed to propagate the information more extensively and with higher quality and on the other hand, due to the public concern about the privacy of personal information and the legal responsibility of these organizations in protecting the private information of their users, they should guarantee that while providing all the information to the population, the privacy is reasonably preserved. This issue becomes more crucial when the datasets published by data mining methods are at risk of attribute and identity disclosure attacks. In order to overcome this problem, several approaches, called p-sensitive k-anonymity, p+-sensitive k-anonymity, and (p, α-sensitive k-anonymity, were proposed. The drawbacks of these methods include the inability to protect micro datasets against attribute disclosure and the high value of the distortion ratio. In order to eliminate these drawbacks, this paper proposes an algorithm that fully protects the propagated micro data against identity and attribute disclosure and significantly reduces the distortion ratio during the anonymity process.

  20. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  1. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  2. Advancing Material Models for Automotive Forming Simulations

    Science.gov (United States)

    Vegter, H.; An, Y.; ten Horn, C. H. L. J.; Atzema, E. H.; Roelofsen, M. E.

    2005-08-01

    Simulations in automotive industry need more advanced material models to achieve highly reliable forming and springback predictions. Conventional material models implemented in the FEM-simulation models are not capable to describe the plastic material behaviour during monotonic strain paths with sufficient accuracy. Recently, ESI and Corus co-operate on the implementation of an advanced material model in the FEM-code PAMSTAMP 2G. This applies to the strain hardening model, the influence of strain rate, and the description of the yield locus in these models. A subsequent challenge is the description of the material after a change of strain path. The use of advanced high strength steels in the automotive industry requires a description of plastic material behaviour of multiphase steels. The simplest variant is dual phase steel consisting of a ferritic and a martensitic phase. Multiphase materials also contain a bainitic phase in addition to the ferritic and martensitic phase. More physical descriptions of strain hardening than simple fitted Ludwik/Nadai curves are necessary. Methods to predict plastic behaviour of single-phase materials use a simple dislocation interaction model based on the formed cells structures only. At Corus, a new method is proposed to predict plastic behaviour of multiphase materials have to take hard phases into account, which deform less easily. The resulting deformation gradients create geometrically necessary dislocations. Additional micro-structural information such as morphology and size of hard phase particles or grains is necessary to derive the strain hardening models for this type of materials. Measurements available from the Numisheet benchmarks allow these models to be validated. At Corus, additional measured values are available from cross-die tests. This laboratory test can attain critical deformations by large variations in blank size and processing conditions. The tests are a powerful tool in optimising forming simulations

  3. A Modified Heuristic-Block Protocol Model for Privacy and Concurrency in Cloud

    Directory of Open Access Journals (Sweden)

    Akhilesh Kumar Bhardwaj

    2015-09-01

    Full Text Available With boost in the figure of cloud users and the magnitude of sensitive data on cloud, shielding of cloud has become more important. Competent methods are consistently desirable to ensure the information privacy and load management of outsource data on un-trusted cloud servers. The base of our proposed idea is the chronological display of metaheuristic firefly algorithm and blocks based Merkle hash tree protocol. This pool of combination significantly reduces the communication delay and I/O costs. The projected scheme in addition considers the dynamic data operations at block level while maintaining the equivalent security assurance. Our method makes use of third party auditor to periodically verify the data stored at cloud provider side. Our elucidation removes the burden of verification from the user side and alleviates both the user’s and storage service’s fear about data outburst and data corruptions.

  4. Location Privacy Protection Model Based on Social Relationships%面向社交关系的位置隐私保护模型研究

    Institute of Scientific and Technical Information of China (English)

    黄静

    2016-01-01

    This paper proposes a location privacy protection model based on social relationships ,for .trusted social relations and untrusted strangers when sharing location information through social platform in the mobile social networks .The model classified social relationships and location privacy for different levels of users seeing different precision location in-formation ,so as to protect the position privacy .Classification of social relationships includes the user's friends classified by intimacy and strangers classified by trust model .Compared with L-intimacy model ,this model has lower time complexity and privacy leakage rates ,and can well protect the user's location privacy .%针对移动社交网络中用户通过社交平台分享位置信息时存在可信社交关系和不可信陌生人的攻击等问题 ,提出了一种面向社交关系的位置隐私保护模型.该模型通过对社交关系进行分类和对位置隐私进行分级 ,让不同级别的用户看到不同精度的位置信息 ,从而实现对位置的隐私保护.其中 ,对社交关系的分类包括对用户的好友类别按亲密度分级和对陌生人类别按信任模型计算值分级.相较于L-intimacy模型 ,该模型具有较低的时间复杂度和隐私泄漏率 ,且能有效保护用户位置隐私.

  5. Privacy Preserving Data Publishing: A Classification Perspective

    Directory of Open Access Journals (Sweden)

    A N K Zaman

    2014-09-01

    Full Text Available The concept of privacy is expressed as release of information in a controlled way. Privacy could also be defined as privacy decides what type of personal information should be released and which group or person can access and use it. Privacy Preserving Data Publishing (PPDP is a way to allow one to share anonymous data to ensure protection against identity disclosure of an individual. Data anonymization is a technique for PPDP, which makes sure the published data, is practically useful for processing (mining while preserving individuals sensitive information. Most works reported in literature on privacy preserving data publishing for classification task handle numerical data. However, most real life data contains both numerical and non-numerical data. Another shortcoming is that use of distributed model called Secure Multiparty Computation (SMC. For this research, a centralized model is used for independent data publication by a single data owner. The key challenge for PPDP is to ensure privacy as well as to keep the data usable for research. Differential privacy is a technique that ensures the highest level of privacy for a record owner while providing actual information of the data set. The aim of this research is to develop a framework that satisfies differential privacy standards and to ensure maximum data usability for a classification tasks such as patient data classification in terms of blood pressure.

  6. Consolidation modelling for thermoplastic composites forming simulation

    Science.gov (United States)

    Xiong, H.; Rusanov, A.; Hamila, N.; Boisse, P.

    2016-10-01

    Pre-impregnated thermoplastic composites are widely used in the aerospace industry for their excellent mechanical properties, Thermoforming thermoplastic prepregs is a fast manufacturing process, the automotive industry has shown increasing interest in this manufacturing processes, in which the reconsolidation is an essential stage. The model of intimate contact is investigated as the consolidation model, compression experiments have been launched to identify the material parameters, several numerical tests show the influents of the temperature and pressure applied during processing. Finally, a new solid-shell prismatic element has been presented for the simulation of consolidation step in the thermoplastic composites forming process.

  7. 物联网空间内LBS隐私安全保护模型研究%Privacy-preserving model of LBS in Internet of Things

    Institute of Scientific and Technical Information of China (English)

    路红; 廖龙龙

    2014-01-01

    To solve the problem, the framework, various privacy threats and security needs of LBS in IoT are discussed, and a privacy-preserving model is designed which can protect privacy of real identity, physical location and service con-tent in IoT. The privacy security model is realized by using Onion Routing algorithm and fully homomorphic encryption algorithm. The analysis shows that this model can realize identity anonymity, position protection, service encryption, etc., and can keep safe of LBS privacy in IoT.%为解决物联网空间内LBS服务的隐私安全问题,在分析物联网环境中的LBS服务框架的基础上,针对其面临的各种隐私安全威胁及安全需求,基于匿名通信原理和可计算加密思想设计了一种支持真实身份、实体位置和服务内容等LBS隐私保护的安全模型,提出采用Onion Routing算法和全同态加密算法实现该模型。模型实现算法的分析表明,该模型可实现身份匿名、位置保护、服务加密等,对物联网空间内LBS隐私具有很好的安全保护。

  8. BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication

    Directory of Open Access Journals (Sweden)

    Adeel Anjum

    2017-01-01

    Full Text Available Privacy-Preserving Data Publishing (PPDP has become a critical issue for companies and organizations that would release their data. k-Anonymization was proposed as a first generalization model to guarantee against identity disclosure of individual records in a data set. Point access methods (PAMs are not well studied for the problem of data anonymization. In this article, we propose yet another approximation algorithm for anonymization, coined BangA, that combines useful features from Point Access Methods (PAMs and clustering. Hence, it achieves fast computation and scalability as a PAM, and very high quality thanks to its density-based clustering step. Extensive experiments show the efficiency and effectiveness of our approach. Furthermore, we provide guidelines for extending BangA to achieve a relaxed form of differential privacy which provides stronger privacy guarantees as compared to traditional privacy definitions.

  9. Fuzzy Privacy Decision for Context-Aware Access Personal Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie

    2007-01-01

    A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.

  10. Star forming filaments in warm dark models

    CERN Document Server

    Gao, Liang; Springel, Volker

    2014-01-01

    We performed a hydrodynamical cosmological simulation of the formation of a Milky Way-like galaxy in a warm dark matter (WDM) cosmology. Smooth and dense filaments, several co-moving mega parsec long, form generically above z 2 in this model. Atomic line cooling allows gas in the centres of these filaments to cool to the base of the cooling function, resulting in a very striking pattern of extended Lyman-limit systems (LLSs). Observations of the correlation function of LLSs might hence provide useful limits on the nature of the dark matter. We argue that the self-shielding of filaments may lead to a thermal instability resulting in star formation. We implement a sub-grid model for this, and find that filaments rather than haloes dominate star formation until z 6. Reionisation decreases the gas density in filaments, and the more usual star formation in haloes dominates below z 6, although star formation in filaments continues until z=2. Fifteen per cent of the stars of the z=0 galaxy formed in filaments. At hi...

  11. Privacy and Social Interaction

    NARCIS (Netherlands)

    B. Roessler; D. Mokrosinska

    2013-01-01

    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an a

  12. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  13. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2016-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  14. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... CFR Part 261a Privacy Act of 1974; Privacy Act Regulation AGENCY: Board of Governors of the Federal...) is issuing a final rule to amend its regulation implementing the Privacy Act of 1974 (Privacy Act..., and applicants for Board employment, for access to their records under the Privacy Act; the amendment...

  15. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  16. Modelling the chemistry of star forming filaments

    CERN Document Server

    Seifried, D

    2015-01-01

    We present simulations of star forming filaments incorporating - to our knowledge - the largest chemical network used to date on-the-fly in a 3D-MHD simulation. The network contains 37 chemical species and about 300 selected reaction rates. For this we use the newly developed package KROME (Grassi et al. 2014). We combine the KROME package with an algorithm which allows us to calculate the column density and attenuation of the interstellar radiation field necessary to properly model heating and ionisation rates. Our results demonstrate the feasibility of using such a complex chemical network in 3D-MHD simulations on modern supercomputers. We perform simulations with different strengths of the interstellar radiation field and the cosmic ray ionisation rate. We find that towards the centre of the filaments there is gradual conversion of hydrogen from H^+ over H to H_2 as well as of C^+ over C to CO. Moreover, we find a decrease of the dust temperature towards the centre of the filaments in agreement with recent...

  17. Game Theory Meets Network Security and Privacy

    OpenAIRE

    Manshaei, Mohammadhossein; Zhu, Quanyan; Alpcan, Tansu; Basar, Tamer; Hubaux, Jean-Pierre

    2012-01-01

    This survey provides a structured and comprehensive overview of the research contributions that analyze and solve security and privacy problems in computer networks by game-theoretic approaches. A selected set of works are presented to highlight the application of game theory in order to address different forms of security and privacy problems in computer networks and mobile applications. The presented works are classified into six main categories based on their topics: security of the physic...

  18. Participatory Privacy: Enabling Privacy in Participatory Sensing

    CERN Document Server

    De Cristofaro, Emiliano

    2012-01-01

    Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed information) and consumers (i.e., applications accessing the data). Then, we propose an efficient solution designed for mobile phone users, which incurs very low overhead. Finally, we di...

  19. Electrically assisted forming modeling and control

    CERN Document Server

    Salandro, Wesley A; Bunget, Cristina; Mears, Laine; Roth, John T

    2015-01-01

    Maximizing reader insights into the latest research findings and applications of Electrically-Assisted Forming (EAF) – whereby metals are formed under an electric current field – this book explains how such a process produces immediate improved formability of metals beyond the extent of thermal softening, and allows metals to be formed to greater elongation with lower mechanical energy as well as allowing for lightweight brittle metals such as magnesium and titanium to be formed without external heating or annealing, enabling the more effective use of these lightweight metals in design. Including case studies that illustrate and support the theoretical content and real-world applications of the techniques discussed, this book also serves to enrich readers understanding of the underlying theories that influence electro-plastic behaviour. The authors have extensive experience in studying Electrically-Assisted Forming and have written extensively on the topic with publications including experimental works, t...

  20. Privacy, Democracy and Surveillance

    OpenAIRE

    Lever, Annabelle

    2013-01-01

    How should we think about our claims to privacy and their relationship to security? Must we suppose that privacy should give way before the demands of security whenever the two cannot both be fully protected? This is the position presented by Sir David Omand on numerous occasions and, most recently, in his response to the revelations of Edward Snowden. However, this article shows, Omand's reasoning and conclusions are both problematic, as the protection of privacy is necessary to a democratic...

  1. Privacy-Preserving Restricted Boltzmann Machine

    Science.gov (United States)

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  2. User Privacy and Empowerment:

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2017-01-01

    of personal information and its manage-ment. Thus, empowering users and enhancing awareness are essential to compre-hending the value of secrecy. This paper also introduced latest advances in the domain of privacy issues like User Managed Access (UMA) can state suitable requirements for user empowerment...... and will cater to redefine the trustworthy relationship between service providers and users. Subsequently, this paper con-cludes with suggestions for providing empowerment to the user and developing user-centric, transparent business models.......Today, the service providers are capable of assembling a huge measure of user information using Big data techniques. For service providers, user infor-mation has become a vital asset. The present business models are attentive to collect extensive users’ information to extract useful knowledge...

  3. Partitioning-based mechanisms under personalized differential privacy

    Science.gov (United States)

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-01-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t-round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms. PMID:28932827

  4. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  5. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of onl

  6. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Science.gov (United States)

    2010-01-01

    ... privacy. (a) The Director of the Office of Human Resources, with advice from the Senior Privacy Act... identifier. (7) Maintain an accounting, in the prescribed form, of all dissemination of personal...

  7. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  8. The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling

    Science.gov (United States)

    Peikari, Hamid Reza

    Customer satisfaction and loyalty have been cited as the e-commerce critical success factors and various studies have been conducted to find the antecedent determinants of these concepts in the online transactions. One of the variables suggested by some studies is perceived security. However, these studies have referred to security from a broad general perspective and no attempts have been made to study the specific security related variables. This paper intends to study the influence on security statement and technical protection on satisfaction, loyalty and privacy. The data was collected from 337 respondents and after the reliability and validity tests, path analysis was applied to examine the hypotheses. The results suggest that loyalty is influenced by satisfaction and security statement and no empirical support was found for the influence on technical protection and privacy on loyalty. Moreover, it was found that security statement and technical protection have a positive significant influence on satisfaction while no significant effect was found for privacy. Furthermore, the analysis indicated that security statement have a positive significant influence on technical protection while technical protection was found to have a significant negative impact on perceived privacy.

  9. Normal forms for reduced stochastic climate models

    NARCIS (Netherlands)

    Majda, A.J.; Franzke, C.; Crommelin, D.T.

    The systematic development of reduced low-dimensional stochastic climate models from observations or comprehensive highdimensional climate models is an important topic for atmospheric low-frequency variability, climate sensitivity, and improved extended range forecasting. Here techniques from

  10. Reduced form models of bond portfolios

    OpenAIRE

    Matti Koivu; Teemu Pennanen

    2010-01-01

    We derive simple return models for several classes of bond portfolios. With only one or two risk factors our models are able to explain most of the return variations in portfolios of fixed rate government bonds, inflation linked government bonds and investment grade corporate bonds. The underlying risk factors have natural interpretations which make the models well suited for risk management and portfolio design.

  11. An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures

    Science.gov (United States)

    Yang, Yi; Zhu, Sencun; Cao, Guohong; Laporta, Thomas

    Source locations of events are sensitive contextual information that needs to be protected in sensor networks. Previous work focuses on either an active local attacker that traces back to a real source in a hop-by-hop fashion, or a passive global attacker that eavesdrops/analyzes all network traffic to discover real sources. An active global attack model, which is more realistic and powerful than current ones, has not been studied yet. In this paper, we not only formalize this strong attack model, but also propose countermeasures against it.

  12. 基于V-grid模型的位置隐私保护方法%Location Privacy Protection Method Based on V-grid Model

    Institute of Scientific and Technical Information of China (English)

    司超; 徐红云

    2012-01-01

    The problem is that Casper model can only adapt to the situation in which users are moving slowly. When users are in high-speed movement, Casper model can not construct good anonymous area and cause poor service quality. In order to solve this problem, this paper proposes a location privacy protection method based on V-grid model. It introduces V-grid model which takes in the parameter of users speed, updates users' locations before constructing anonymous areas and meets kinds of users' privacy need. Experimental results show that V-grid model has better applicability and achieves higher service quality than Casper model.%Casper模型只适用于用户移动速度较慢的情况,当用户高速运动时,匿名区域构造成功率下降,LBS服务质量降低.为此,提出一种基于V-grid模型的位置隐私保护方法.引入用户移动速度,在构造匿名区域前更新用户位置,以满足不同移动速度用户的隐私需求.实验结果表明,V- grid模型适用于户运动速度不同的情况,比Casper模型的匿名区域构造成功率更高,服务质量更好.

  13. Disease prevention versus data privacy: using landcover maps to inform spatial epidemic models.

    Science.gov (United States)

    Tildesley, Michael J; Ryan, Sadie J

    2012-01-01

    The availability of epidemiological data in the early stages of an outbreak of an infectious disease is vital for modelers to make accurate predictions regarding the likely spread of disease and preferred intervention strategies. However, in some countries, the necessary demographic data are only available at an aggregate scale. We investigated the ability of models of livestock infectious diseases to predict epidemic spread and obtain optimal control policies in the event of imperfect, aggregated data. Taking a geographic information approach, we used land cover data to predict UK farm locations and investigated the influence of using these synthetic location data sets upon epidemiological predictions in the event of an outbreak of foot-and-mouth disease. When broadly classified land cover data were used to create synthetic farm locations, model predictions deviated significantly from those simulated on true data. However, when more resolved subclass land use data were used, moderate to highly accurate predictions of epidemic size, duration and optimal vaccination and ring culling strategies were obtained. This suggests that a geographic information approach may be useful where individual farm-level data are not available, to allow predictive analyses to be carried out regarding the likely spread of disease. This method can also be used for contingency planning in collaboration with policy makers to determine preferred control strategies in the event of a future outbreak of infectious disease in livestock.

  14. Disease prevention versus data privacy: using landcover maps to inform spatial epidemic models.

    Directory of Open Access Journals (Sweden)

    Michael J Tildesley

    Full Text Available The availability of epidemiological data in the early stages of an outbreak of an infectious disease is vital for modelers to make accurate predictions regarding the likely spread of disease and preferred intervention strategies. However, in some countries, the necessary demographic data are only available at an aggregate scale. We investigated the ability of models of livestock infectious diseases to predict epidemic spread and obtain optimal control policies in the event of imperfect, aggregated data. Taking a geographic information approach, we used land cover data to predict UK farm locations and investigated the influence of using these synthetic location data sets upon epidemiological predictions in the event of an outbreak of foot-and-mouth disease. When broadly classified land cover data were used to create synthetic farm locations, model predictions deviated significantly from those simulated on true data. However, when more resolved subclass land use data were used, moderate to highly accurate predictions of epidemic size, duration and optimal vaccination and ring culling strategies were obtained. This suggests that a geographic information approach may be useful where individual farm-level data are not available, to allow predictive analyses to be carried out regarding the likely spread of disease. This method can also be used for contingency planning in collaboration with policy makers to determine preferred control strategies in the event of a future outbreak of infectious disease in livestock.

  15. Practicing Differential Privacy in Health Care: A Review

    Directory of Open Access Journals (Sweden)

    Fida K. Dankar

    2013-04-01

    Full Text Available Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It has also been proposed as an appropriate model for protecting health data. In this paper we review the current literature on differential privacy and highlight important general limitations to the model and the proposed mechanisms. We then examine some practical challenges to the application of differential privacy to health data. The most severe limitation is the theoretical nature of the privacy parameter epsilon. It has implications on our ability to quantify the level of anonymization that would be guaranteed to patients, as well as assessing responsibilities when a privacy breach occurs. The review concludes by identifying the areas that researchers and practitioners need to address to increase the adoption of differential privacy for health data.

  16. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  17. Privacy and Publicity

    DEFF Research Database (Denmark)

    2013-01-01

    An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy......An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy...

  18. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  19. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  20. Privacy and Publicity

    DEFF Research Database (Denmark)

    Schaumburg-Müller, Sten

    2013-01-01

    An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy......An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy...

  1. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for ex

  2. Identity And Privacy Services

    Directory of Open Access Journals (Sweden)

    Harry Katzan, Jr.

    2010-12-01

    Full Text Available Personal identity and privacy are important topics in information systems in general and data analytics in particular.  Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life.  Related subjects are behavioral tracking, personal-identifiable information (PII, privacy data relevance, data repurposing, identity theft, and homeland security.  Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.  This is a general paper on this important subject, intended to give exposure to the constituent topics.

  3. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often f

  4. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... by analyzing a location-based system for airport passengers developed for a Copenhagen Airport, and the dimensions are used to explain user reactions to different services offered by the system....... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach...

  5. Business models - their semantic form and structure

    OpenAIRE

    Kinderis, Remigijus

    2012-01-01

    Straipsnyje siekiama išgryninti verslo modelio koncepto semantiką. Analizuojama verslo modelio samprata, atliekant apibrėžimų chronologinės eigos analizę, parengiant prasminių žodžių žemėlapį. [...] The concept of business model is the most frequently considered and discussed in different modern scientific and business publications. Business model has been perceived and analyzed as a modern method of competition among business enterprises. The scientists and practicians agree on the common...

  6. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  7. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    by taking the distributed structure of the system into account and improving the efficiency in terms of computation and communication by data packing. While our construction can be easily adjusted to a centralized or a distributed computing model, we rely on a set of particular users that help the service...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  8. Challenges and Opportunities for Enhancing User Privacy and User Empowerment

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2015-01-01

    Big data techniques allow service providers to collect data on a massive scale. User data has turned into an important asset to service providers. The current business model of service providers gathers too much information for knowledge extraction. In the era of Google and Facebook, privacy...... information and current business models as privacy issues. The important identified issues include that users are missing privacy awareness tools and unavailability to visualize of personal information flow. We also present some recent advances in these areas to address concern privacy issues like User...

  9. Preserving Differential Privacy in Degree-Correlation based Graph Generation

    Directory of Open Access Journals (Sweden)

    Yue Wang

    2013-08-01

    Full Text Available Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enforce differential privacy on graph model parameters learned from the original network and then generate the graphs for releasing using the graph model with the private parameters. In particular, we develop a differential privacy preserving graph generator based on the dK-graph generation model. We first derive from the original graph various parameters (i.e., degree correlations used in the dK-graph model, then enforce edge differential privacy on the learned parameters, and finally use the dKgraph model with the perturbed parameters to generate graphs. For the 2K-graph model, we enforce the edge differential privacy by calibrating noise based on the smooth sensitivity, rather than the global sensitivity. By doing this, we achieve the strict differential privacy guarantee with smaller magnitude noise. We conduct experiments on four real networks and compare the performance of our private dK-graph models with the stochastic Kronecker graph generation model in terms of utility and privacy tradeoff. Empirical evaluations show the developed private dK-graph generation models significantly outperform the approach based on the stochastic Kronecker generation model.

  10. Preserving Differential Privacy in Degree-Correlation based Graph Generation.

    Science.gov (United States)

    Wang, Yue; Wu, Xintao

    2013-08-01

    Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enforce differential privacy on graph model parameters learned from the original network and then generate the graphs for releasing using the graph model with the private parameters. In particular, we develop a differential privacy preserving graph generator based on the dK-graph generation model. We first derive from the original graph various parameters (i.e., degree correlations) used in the dK-graph model, then enforce edge differential privacy on the learned parameters, and finally use the dK-graph model with the perturbed parameters to generate graphs. For the 2K-graph model, we enforce the edge differential privacy by calibrating noise based on the smooth sensitivity, rather than the global sensitivity. By doing this, we achieve the strict differential privacy guarantee with smaller magnitude noise. We conduct experiments on four real networks and compare the performance of our private dK-graph models with the stochastic Kronecker graph generation model in terms of utility and privacy tradeoff. Empirical evaluations show the developed private dK-graph generation models significantly outperform the approach based on the stochastic Kronecker generation model.

  11. Protecting Locations with Differential Privacy under Temporal Correlations

    OpenAIRE

    Xiao, Yonghui; Xiong, Li

    2014-01-01

    Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and location-based applications. While spatial transformation techniques such as location perturbation or generalization have been studied extensively, most techniques rely on syntactic privacy models without rigorous privacy guarantee. Many of them only consider static scenarios or perturb the location at single timestamps without considering temporal correlations of a moving user's locations, and...

  12. The Clean Privacy Ecosystem of the Future Internet

    OpenAIRE

    Lothar Fritsch

    2013-01-01

    This article speculates on the future of privacy and electronic identities on the Internet. Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a larger context—an ecosystem of personal information and electronic identities. The article argues for an ecosystem view of personal information and electronic identities, as both personal information and identity information are basi...

  13. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  14. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  15. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  16. Privacy in Online Social Networking Sites

    Directory of Open Access Journals (Sweden)

    M.Ida Evones

    2015-11-01

    Full Text Available There are more than 192 act ive social networking websites. Bringing every kind of social group together in one place and letting them interact is really a big thing indeed .Huge amount of information process in the sites each day, end up making it vulnerable to attack. There is no systematic framework taking into account the importance of privacy. Increased privacy settings don’t always guarantee privacy when there is a loop hole in the applications. Lack of user education results is over sharing. Privacy settings to limit access to some data are available, but these settings are never the default. Only a tiny minority make use of these. Online social network does not provide any demarcation line between private and public information. The personal informat ion shared in online social networks can harm the user in often unexpected ways. Private data is available in plenty. The major privacy problems are due to complicated privacy model, implementation errors and economic pressure. Until recently, not much work was done in this area. The recent papers, which I have collected is a Testimony to state that lot of work needs to be done in this area.

  17. Composition Attacks and Auxiliary Information in Data Privacy

    CERN Document Server

    Ganta, Srivatsava Ranjit; Smith, Adam

    2008-01-01

    Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary information (also called external knowledge, background knowledge, or side information) that an adversary gleans from other channels such as the web, public records, or domain knowledge. This paper explores how one can reason about privacy in the face of rich, realistic sources of auxiliary information. Specifically, we investigate the effectiveness of current anonymization schemes in preserving privacy when multiple organizations independently release anonymized data about overlapping populations. 1. We investigate composition attacks, in which an adversary uses independent anonymized releases to breach privacy. We explain why recently proposed models of limited auxiliary information fail to capture composition attacks. Our experiments demonstrate that even a simple instance of a composition attack can breach privacy in practice, for a large ...

  18. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  19. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  20. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  1. Legal Protections for Privacy

    Science.gov (United States)

    Leslie, David W.

    1977-01-01

    Individual interest in privacy is a multiple legal issue, roughly divided into four parts according to different types of law: constitutional, statutory, administrative, and common law. Policy implications of this issue for institutions are discussed. (Editor/LBH)

  2. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  3. Chou-Yang model and PHI form factor

    Energy Technology Data Exchange (ETDEWEB)

    Fazal-e-Aleem; Saleem, M.; Rafique, M.

    1988-03-01

    By using the deduced differential cross-section data for PHIp elastic scattering at 175 GeV/c in the Chou-Yang model, the PHI form factor has been computed and parametrized. Then in conjunction with the proton form factor this form factor is used in the pristine Chou-Yang model to obtain differential cross-section data at Fermilab energies. The theoretical results agree with the experimental measurements, endorsing the conjecture that the hadronic form factor of neutral particle is proportional to its magnetic form factor.

  4. Pulsar average wave forms and hollow-cone beam models

    Science.gov (United States)

    Backer, D. C.

    1976-01-01

    Pulsar wave forms have been analyzed from observations conducted over a wide radio-frequency range to assess the wave-form morphologies and to measure wave-form widths. The results of the analysis compare favorably with the predictions of a model with a hollow-cone beam of fixed dimensions and with random orientation of both the observer and the cone axis with respect to the pulsar spin axis. A class of three-component wave forms is included in the model by adding a central pencil beam to the hollow-cone hypothesis. The consequences of a number of discrepancies between observations and quantitative predictions of the model are discussed.

  5. Integrated thermomechanical model for forming of glass containers

    Directory of Open Access Journals (Sweden)

    Martins Bruno

    2016-01-01

    Full Text Available In this work an integrated model for all the process of glass forming of glass containers is presented. The model addresses press-and-blow and blow-and-blow procedures from the gob forming to the final product. Glass forming involves coupled thermal-mechanical physical phenomena, in which the material viscous flow is highly dependent on heat transfer which, in turn, is dependent changes of shape due to material flow. Numerical aspects associated with the model implementation and its validation with real formed products are discussed.

  6. 31 CFR 50.17 - Use of model forms.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Use of model forms. 50.17 Section 50.17 Money and Finance: Treasury Office of the Secretary of the Treasury TERRORISM RISK INSURANCE PROGRAM Disclosures as Conditions for Federal Payment § 50.17 Use of model forms. (a) Policies in force...

  7. Formability models for warm sheet metal forming analysis

    Science.gov (United States)

    Jiang, Sen

    Several closed form models for the prediction of strain space sheet metal formability as a function of temperature and strain rate are proposed. The proposed models require only failure strain information from the uniaxial tension test at an elevated temperature setting and failure strain information from the traditionally defined strain space forming limit diagram at room temperature, thereby featuring the advantage of offering a full forming limit description without having to carry out expensive experimental studies for multiple modes of deformation under the elevated temperature. The Power law, Voce, and Johnson-Cook hardening models are considered along with the yield criterions of Hill's 48 and Logan-Hosford yield criteria. Acceptable correlations between the theory and experiment are reported for all the models under a plane strain condition. Among all the proposed models, the model featuring Johnson-Cook hardening model and Logan-Hosford yield behavior (LHJC model) was shown to best correlate with experiment. The sensitivity of the model with respect to various forming parameters is discussed. This work is significant to those aiming to incorporate closed-form formability models directly into numerical simulation programs for the purpose of design and analysis of products manufactured through the warm sheet metal forming process. An improvement based upon Swift's diffuse necking theory, is suggested in order to enhance the reliability of the model for biaxial stretch conditions. Theory relating to this improvement is provided in Appendix B.

  8. Exploratory Topology Modelling of Form-Active Hybrid Structures

    DEFF Research Database (Denmark)

    Holden Deleuran, Anders; Pauly, Mark; Tamke, Martin;

    2016-01-01

    The development of novel form-active hybrid structures (FAHS) is impeded by a lack of modelling tools that allow for exploratory topology modelling of shaped assemblies. We present a flexible and real-time computational design modelling pipeline developed for the exploratory modelling of FAHS tha...

  9. Universally Optimal Privacy Mechanisms for Minimax Agents

    CERN Document Server

    Gupte, Mangesh

    2010-01-01

    A scheme that publishes aggregate information about sensitive data must resolve the trade-off between utility to information consumers and privacy of the database participants. Differential privacy is a well-established definition of privacy--this is a universal guarantee against all attackers, whatever their side-information or intent. In this paper, we present a universal treatment of utility based on the standard minimax rule from decision theory (in contrast to the utility model in, which is Bayesian). In our model, information consumers are minimax (risk-averse) agents, each possessing some side-information about the query, and each endowed with a loss-function which models their tolerance to inaccuracies. Further, information consumers are rational in the sense that they actively combine information from the mechanism with their side-information in a way that minimizes their loss. Under this assumption of rational behavior, we show that for every fixed count query, a certain geometric mechanism is unive...

  10. E-Commerce and Privacy: Conflict and Opportunity.

    Science.gov (United States)

    Farah, Badie N.; Higby, Mary A.

    2001-01-01

    Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)

  11. E-Commerce and Privacy: Conflict and Opportunity.

    Science.gov (United States)

    Farah, Badie N.; Higby, Mary A.

    2001-01-01

    Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)

  12. LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox

    Science.gov (United States)

    Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich

    2016-01-01

    To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…

  13. Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing

    OpenAIRE

    Changbo Ke; Zhiqiu Huang; Weiwei Li; Yi Sun; Fangxiong Xiao

    2014-01-01

    Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. Therefore how to protect user privacy information has become a research focus. In this paper, firstly, we model service privacy policy and user privacy preference with description logic. Secondly, we use the pellet reasonor to verify the consistency and satisfiability, so as to detect t...

  14. Nucleon form factors in the canonically quantized Skyrme model

    Energy Technology Data Exchange (ETDEWEB)

    Acus, A.; Norvaisas, E. [Lithuanian Academy of Sciences, Vilnius (Lithuania). Inst. of Theoretical Physics and Astronomy; Riska, D.O. [Helsinki Univ. (Finland). Dept. of Physics; Helsinki Univ. (Finland). Helsinki Inst. of Physics

    2001-08-01

    The explicit expressions for the electric, magnetic, axial and induced pseudoscalar form factors of the nucleons are derived in the ab initio quantized Skyrme model. The canonical quantization procedure ensures the existence of stable soliton solutions with good quantum numbers. The form factors are derived for representations of arbitrary dimension of the SU(2) group. After fixing the two parameters of the model, f{sub {pi}} and e, by the empirical mass and electric mean square radius of the proton, the calculated electric and magnetic form factors are fairly close to the empirical ones, whereas the the axial and induced pseudoscalar form factors fall off too slowly with momentum transfer. (orig.)

  15. Nucleon form factors in the canonically quantized Skyrme model

    CERN Document Server

    Acus, A; Riska, D O

    2001-01-01

    The explicit expressions for the electric, magnetic, axial and induced pseudoscalar form factors of the nucleons are derived in the {\\it ab initio} quantized Skyrme model. The canonical quantization procedure ensures the existence of stable soliton solutions with good quantum numbers. The form factors are derived for representations of arbitrary dimension of the SU(2) group. After fixing the two parameters of the model, $f_\\pi$ and $e$, by the empirical mass and electric mean square radius of the proton, the calculated electric and magnetic form factors are fairly close to the empirical ones, whereas the the axial and induced pseudoscalar form factors fall off too slowly with momentum transfer.

  16. Gain-Based Relief for Invasion of Privacy

    Directory of Open Access Journals (Sweden)

    Sirko Harder

    2013-11-01

    Full Text Available In many common law jurisdictions, some or all instances of invasion of privacy constitute a privacy-specific wrong either at common law (including equity or under statute. A remedy invariably available for such a wrong is compensation for loss. However, the plaintiff may instead seek to claim the profit the defendant has made from the invasion. This article examines when a plaintiff is, and should be, entitled to claim that profit, provided that invasion of privacy is actionable as such. After a brief overview of the relevant law in major common law jurisdictions, the article investigates how invasion of privacy fits into a general concept of what is called ‘restitution for wrongs’. It will be argued that the right to privacy is a right against the whole world and as such forms a proper basis of awarding gain-based relief for the unauthorised use of that right.

  17. Valuating Privacy with Option Pricing Theory

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer

    One of the key challenges in the information society is responsible handling of personal data. An often-cited reason why people fail to make rational decisions regarding their own informational privacy is the high uncertainty about future consequences of information disclosures today. This chapter builds an analogy to financial options and draws on principles of option pricing to account for this uncertainty in the valuation of privacy. For this purpose, the development of a data subject's personal attributes over time and the development of the attribute distribution in the population are modeled as two stochastic processes, which fit into the Binomial Option Pricing Model (BOPM). Possible applications of such valuation methods to guide decision support in future privacy-enhancing technologies (PETs) are sketched.

  18. Surrogate POD models for building forming limit diagrams of parameterized sheet metal forming applications

    Science.gov (United States)

    Hamdaoui, M.; Le Quilliec, Guénhaël; Breitkopf, Piotr; Villon, Pierre

    2013-05-01

    The aim of this work is to present a surrogate POD (Proper Orthogonal Decomposition) approach for building forming limit diagrams at minimum cost for parameterized sheet metal formed work-pieces. First, a Latin Hypercube Sampling is performed on the design parameter space. Then, at each design site, displacement fields are computed using the popular open-source finite element software Code_Aster. Then, the method of snapshots is used for POD mode determination. POD coefficients are interpolated using kriging. Furthermore, an error analysis of the surrogate POD model is performed on a validation set. It is shown that on the considered use case the accuracy of the surrogate POD model is excellent for the representation of finite element displacement fields. The validated surrogate POD model is then used to build forming limit diagrams (FLD) for any design parameter to assess the quality of stamped metal sheets. Using the surrogate POD model, the Green-Lagrange strain tensor is derived, then major and minor principal deformations are determined at Gauss points for each mesh element. Furthermore, a signed distance between the forming limit curve in rupture and the obtained cloud of points in the plane (ɛ2, ɛ1) is computed to assess the quality of the formed workpiece. The minimization of this signed distance allows determining the safest design for the chosen use case.

  19. Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Changbo Ke

    2014-01-01

    Full Text Available Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. Therefore how to protect user privacy information has become a research focus. In this paper, firstly, we model service privacy policy and user privacy preference with description logic. Secondly, we use the pellet reasonor to verify the consistency and satisfiability, so as to detect the privacy conflict between services and user. Thirdly, we present the algorithm of detecting privacy conflict in the process of cloud service composition and prove the correctness and feasibility of this method by case study and experiment analysis. Our method can reduce the risk of user sensitive privacy information being illegally used and propagated by outsourcing services. In the meantime, the method avoids the exception in the process of service composition by the privacy conflict, and improves the trust degree of cloud service providers.

  20. Inequalities for the quantum privacy

    Science.gov (United States)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  1. Form factors in an algebraic model of the nucleon

    CERN Document Server

    Bijker, R

    1995-01-01

    We study the electromagnetic form factors of the nucleon in a collective model of baryons. In an algebraic approach to hadron structure, we derive closed expressions for both elastic and transition form factors, and consequently for the helicity amplitudes that can be measured in electro- and photoproduction.

  2. Relativistic quark model for the Omega- electromagnetic form factors

    Energy Technology Data Exchange (ETDEWEB)

    G. Ramalho, K. Tsushima, Franz Gross

    2009-08-01

    We compute the Omega- electromagnetic form factors and the decuplet baryon magnetic moments using a quark model application of the Covariant Spectator Theory. Our predictions for the Omega- electromagnetic form factors can be tested in the future by lattice QCD simulations at the physical strange quark mass.

  3. A relativistic quark model for the Omega- electromagnetic form factors

    CERN Document Server

    Ramalho, G; Gross, Franz

    2009-01-01

    We compute the Omega- electromagnetic form factors and the decuplet baryon magnetic moments using a quark model application of the Covariant Spectator Theory. Our predictions for the Omega- electromagnetic form factors can be tested in the future by lattice QCD simulations at the physical strange quark mass.

  4. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  5. Submission Form for Peer-Reviewed Cancer Risk Prediction Models

    Science.gov (United States)

    If you have information about a peer-reviewd cancer risk prediction model that you would like to be considered for inclusion on this list, submit as much information as possible through the form on this page.

  6. Reference models for forming organisational or collaborative pedagogical best practices

    NARCIS (Netherlands)

    Lee, Chien-Sing; Koper, Rob; Kommers, Piet; Hedberg, John

    2008-01-01

    Lee, Chien-Sing, Koper, R., Kommers, P., & Hedberg, John (Eds.) (2008). Reference models for forming organisational or collaborative pedagogical best practices [special issue]. International Journal of Continuing Engineering Education and Life-Long Learning, 18(1).

  7. 78 FR 73466 - Privacy Act

    Science.gov (United States)

    2013-12-06

    ... CORPORATION 22 CFR Part 707 Privacy Act AGENCY: Overseas Private Investment Corporation. ACTION: Notice of... (``OPIC'') Privacy Act (``PA'') regulations by making substantive and administrative changes. These... procedure, Privacy. For the reasons stated in the preamble the Overseas Private Investment Corporation...

  8. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  9. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  10. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  11. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  12. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2010-11-15

    ... including scars, marks, and tattoos; Automobile registration information; Watch list information; Medical... obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act...

  13. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... and hair color; Distinguishing marks including scars, marks, and tattoos; Automobile registration... obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act...

  14. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  15. Cost damping and functional form in transport models

    DEFF Research Database (Denmark)

    Rich, Jeppe; Mabit, Stefan Lindhard

    2015-01-01

    take different forms and be represented as a non-linear-in-parameter form such as the well-known Box–Cox function. However, it could also be specified as non-linear-in-cost but linear-in-parameter forms, which are easier to estimate and improve model fit without increasing the number of parameters....... The specific contributions of the paper are as follows. Firstly, we discuss the phenomenon of cost damping in details and specifically why it occurs. Secondly, we provide a test of damping and an easy assessment of the (linear) damping rate for any variable by estimating two auxiliary linear models. This turns......Transport models allowing for cost damping are characterised by marginally decreasing cost sensitivities in demand. As a result, cost damping is a model extension of the simple linear-in-cost model requiring an appropriate non-linear link function between utility and cost. The link function may...

  16. Cost damping and functional form in transport models

    DEFF Research Database (Denmark)

    Rich, Jeppe; Mabit, Stefan Lindhard

    2016-01-01

    Transport models allowing for cost damping are characterised by marginally decreasing cost sensitivities in demand. As a result, cost damping is a model extension of the simple linear-in-cost model requiring an appropriate non-linear link function between utility and cost. The link function may...... take different forms and be represented as a non-linear-in-parameter form such as the well-known Box–Cox function. However, it could also be specified as non-linear-in-cost but linear-in-parameter forms, which are easier to estimate and improve model fit without increasing the number of parameters....... The specific contributions of the paper are as follows. Firstly, we discuss the phenomenon of cost damping in details and specifically why it occurs. Secondly, we provide a test of damping and an easy assessment of the (linear) damping rate for any variable by estimating two auxiliary linear models. This turns...

  17. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  18. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421

  19. PRIVACY IN CLOUD COMPUTING: A SURVEY

    Directory of Open Access Journals (Sweden)

    Arockiam L

    2012-07-01

    Full Text Available Various cloud computing models are used to increase the profit of an organization. Cloud provides a convenient environment and more advantages to business organizations to run their business. But, it has some issues related to the privacy of data. User’s data are stored and maintained out of user’s premises. The failure of data protection causes many issues like data theft which affects the individual organization. The cloud users may be satisfied, if their data are protected properly from unauthorized access. This paper presents a survey on different privacy issues involved in the cloud service. It also provides some suggestions to the cloud users to select their suitable cloud services by knowing their privacy policies.

  20. Privacy Analysis in Mobile Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    2012-01-01

    Nowadays, mobile social networks are capable of promoting social networking benefits during physical meetings, in order to leverage interpersonal affinities not only among acquaintances, but also between strangers. Due to their foundation on automated sharing of personal data in the physical...... factors: inquirer, purpose of disclosure, access & control of the disclosed information, location familiarity and current activity of the user. This research can serve as relevant input for the design of privacy management models in mobile social networks....... surroundings of the user, these networks are subject to crucial privacy threats. Privacy management systems must be capable of accurate selection of data disclosure according to human data sensitivity evaluation. Therefore, it is crucial to research and comprehend an individual's personal information...

  1. Non-Interactive Differential Privacy: a Survey

    CERN Document Server

    Leoni, David

    2012-01-01

    OpenData movement around the globe is demanding more access to information which lies locked in public or private servers. As recently reported by a McKinsey publication, this data has significant economic value, yet its release has potential to blatantly conflict with people privacy. Recent UK government inquires have shown concern from various parties about publication of anonymized databases, as there is concrete possibility of user identification by means of linkage attacks. Differential privacy stands out as a model that provides strong formal guarantees about the anonymity of the participants in a sanitized database. Only recent results demonstrated its applicability on real-life datasets, though. This paper covers such breakthrough discoveries, by reviewing applications of differential privacy for non-interactive publication of anonymized real-life datasets. Theory, utility and a data-aware comparison are discussed on a variety of principles and concrete applications.

  2. Friction Model for FEM Simulation of Sheet Metal Forming Operations

    Science.gov (United States)

    Keum, Y. T.; Wagoner, R. H.; Lee, J. K.

    2004-06-01

    In order to find the effect of frictional characteristics, lubricant viscosity, tool geometry, and forming speed on the sheet metal forming, a friction tester was designed and manufactured. Friction tests were performed using drawing oils, various tool radii and forming speeds for aluminum alloy sheets, galvanized steels sheets and cold rolled steel sheets. From the experimental observation, the mathematical friction model considering lubricant viscosity, sheet surface roughness and hardness, punch corner radii, and punch speed is developed. By comparing the punch load found by FEM using the proposed friction model with that of experimental measurement when the steel sheets are formed in 2-D geometry in dry and lubricating conditions, the validity and accuracy of the mathematical friction model are demonstrated.

  3. Privacy Policies with Modal Logic: The Dynamic Turn

    Science.gov (United States)

    Aucher, Guillaume; Boella, Guido; van der Torre, Leendert

    Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defined in terms of permitted and obligatory knowledge. With this new approach, we do not have to specify the permissions and prohibitions of all message combinations explicitly. To specify and reason about such privacy policies, we extend a multi-modal logic introduced by Cuppens and Demolombe with update operators modeling the dynamics of both knowledge and privacy policies. We show also how to determine the obligatory messages, how to express epistemic norms, and how to check whether a situation is compliant with respect to a privacy policy.We axiomatize and prove the decidability of our logic.

  4. Development of a Prototype Model-Form Uncertainty Knowledge Base

    Science.gov (United States)

    Green, Lawrence L.

    2016-01-01

    Uncertainties are generally classified as either aleatory or epistemic. Aleatory uncertainties are those attributed to random variation, either naturally or through manufacturing processes. Epistemic uncertainties are generally attributed to a lack of knowledge. One type of epistemic uncertainty is called model-form uncertainty. The term model-form means that among the choices to be made during a design process within an analysis, there are different forms of the analysis process, which each give different results for the same configuration at the same flight conditions. Examples of model-form uncertainties include the grid density, grid type, and solver type used within a computational fluid dynamics code, or the choice of the number and type of model elements within a structures analysis. The objectives of this work are to identify and quantify a representative set of model-form uncertainties and to make this information available to designers through an interactive knowledge base (KB). The KB can then be used during probabilistic design sessions, so as to enable the possible reduction of uncertainties in the design process through resource investment. An extensive literature search has been conducted to identify and quantify typical model-form uncertainties present within aerospace design. An initial attempt has been made to assemble the results of this literature search into a searchable KB, usable in real time during probabilistic design sessions. A concept of operations and the basic structure of a model-form uncertainty KB are described. Key operations within the KB are illustrated. Current limitations in the KB, and possible workarounds are explained.

  5. Formal Methods for Privacy

    Science.gov (United States)

    2009-09-01

    Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith , and Hoeteck Wee. Toward privacy in public databases. In 2nd Theory of Cryptography Conference...Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith . Calibrating noise to sensitivity in private data analysis. In In Proceedings of the 3rd Theory of

  6. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  7. Privacy Policy | FNLCR

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  8. Public privacy: Reciprocity and Silence

    Directory of Open Access Journals (Sweden)

    Jenny Kennedy

    2014-10-01

    Full Text Available In his 1958 poem 'Dedication to my Wife' TS Eliot proclaims "these are private words addressed to you in public". Simultaneously written for his wife, Valerie Fletcher, and to the implied you of a discourse network, Eliot's poem helps to illustrate the narrative voices and silences that are constitutive of an intimate public sphere. This paper situates reciprocity as a condition of possibility for public privacy. It shows how reciprocity is enabled by systems of code operating through material and symbolic registers. Code promises to control communication, to produce neutral, systemic forms of meaning. Yet such automation is challenged by uneven and fragmented patterns of reciprocity. Moreover, examining the media of public privacy reveals historical trajectories important for understanding contemporary socio­technical platforms of reciprocity. To explore the implicit requirement of reciprocity in publicly private practices, three sites of communication are investigated framed by a media archaeology perspective: postal networks, the mail­art project PostSecret and the anonymous zine 'You'.

  9. Privacy-aware knowledge discovery novel applications and new techniques

    CERN Document Server

    Bonchi, Francesco

    2010-01-01

    Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities from prominent organizations not only cover well-established results-they also explore complex domains where privacy issues are generally clear and well defined, but the solutions are still preliminary and in continuous development. Divided into seve

  10. Collaborative Privacy - A Community-Based Privacy Infrastructure

    Science.gov (United States)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  11. Electromagnetic form factors in a collective model of the nucleon

    CERN Document Server

    Bijker, R; Leviatan, A

    1995-01-01

    We study the electromagnetic form factors of the nucleon in a collective model of baryons. Using the algebraic approach to hadron structure, we derive closed expressions for both elastic and transition form factors, and consequently for the helicity amplitudes that can be measured in electro- and photoproduction. Effects of spin-flavor symmetry breaking and of swelling of hadrons with increasing excitation energy are considered.

  12. Electromagnetic form factors in a collective model of the nucleon

    Energy Technology Data Exchange (ETDEWEB)

    Bijker, R.; Iachello, F.; Leviatan, A. [Instituto de Ciencias Nucleares, Universidad Nacional Autonoma de Mexico, Apartado Postal 70-543, 04510 (Mexico)]|[Distrito Federale (Mexico)]|[Center for Theoretical Physics, Sloane Laboratory, Yale University, New Haven, Connecticut 06520-8120 (United States)]|[Racah Institute of Physics, The Hebrew University, Jerusalem 91904 (Israel)

    1996-10-01

    We study the electromagnetic form factors of the nucleon in a collective model of baryons. Using the algebraic approach to hadron structure, we derive closed expressions for both elastic and transition form factors, and consequently for the helicity amplitudes that can be measured in electro- and photoproduction. Effects of spin-flavor symmetry breaking and of swelling of hadrons with increasing excitation energy are considered. {copyright} {ital 1996 The American Physical Society.}

  13. Viscous and thermal modelling of thermoplastic composites forming process

    Science.gov (United States)

    Guzman, Eduardo; Liang, Biao; Hamila, Nahiene; Boisse, Philippe

    2016-10-01

    Thermoforming thermoplastic prepregs is a fast manufacturing process. It is suitable for automotive composite parts manufacturing. The simulation of thermoplastic prepreg forming is achieved by alternate thermal and mechanical analyses. The thermal properties are obtained from a mesoscopic analysis and a homogenization procedure. The forming simulation is based on a viscous-hyperelastic approach. The thermal simulations define the coefficients of the mechanical model that depend on the temperature. The forming simulations modify the boundary conditions and the internal geometry of the thermal analyses. The comparison of the simulation with an experimental thermoforming of a part representative of automotive applications shows the efficiency of the approach.

  14. Simulation of root forms using cellular automata model

    Energy Technology Data Exchange (ETDEWEB)

    Winarno, Nanang, E-mail: nanang-winarno@upi.edu; Prima, Eka Cahya [International Program on Science Education, Universitas Pendidikan Indonesia, Jl. Dr. Setiabudi no 229, Bandung40154 (Indonesia); Afifah, Ratih Mega Ayu [Department of Physics Education, Post Graduate School, Universitas Pendidikan Indonesia, Jl. Dr. Setiabudi no 229, Bandung40154 (Indonesia)

    2016-02-08

    This research aims to produce a simulation program for root forms using cellular automata model. Stephen Wolfram in his book entitled “A New Kind of Science” discusses the formation rules based on the statistical analysis. In accordance with Stephen Wolfram’s investigation, the research will develop a basic idea of computer program using Delphi 7 programming language. To best of our knowledge, there is no previous research developing a simulation describing root forms using the cellular automata model compared to the natural root form with the presence of stone addition as the disturbance. The result shows that (1) the simulation used four rules comparing results of the program towards the natural photographs and each rule had shown different root forms; (2) the stone disturbances prevent the root growth and the multiplication of root forms had been successfully modeled. Therefore, this research had added some stones, which have size of 120 cells placed randomly in the soil. Like in nature, stones cannot be penetrated by plant roots. The result showed that it is very likely to further develop the program of simulating root forms by 50 variations.

  15. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    Science.gov (United States)

    Suter, Sonia M

    2004-04-01

    connoting commodification, disaggregation, and arms-length dealings, can negatively affect the self and harm these relationships. This Article concludes that a deeper understanding of genetic privacy calls for remedies for privacy violations that address dignitary harm and breach of trust, as opposed to market harms, as the property model suggests.

  16. Numerical Modelling of Drawbeads for Forming of Aluminium Alloys

    DEFF Research Database (Denmark)

    Joshi, Y; Christiansen, Peter; Masters, I

    2016-01-01

    The drawbeads in stamping tools are usually designed based on experience from the forming of steel. However, aluminium alloys display different forming behaviour to steels, which is not reflected in the drawbead design for tools used for stamping aluminium. This paper presents experimental results...... from different semi-circular drawbead geometries commonly encountered in automotive dies and compares them to those obtained from Stoughton’s analytical drawbead model and the 2D plane strain drawbead model set up using LS-DYNA.The study was conducted on lubricated NG5754 strips. The results presented...

  17. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  18. An Integrated Numerical Model of the Spray Forming Process

    DEFF Research Database (Denmark)

    Pryds, Nini; Hattel, Jesper; Pedersen, Trine Bjerre;

    2002-01-01

    In this paper, an integrated approach for modelling the entire spray forming process is presented. The basis for the analysis is a recently developed model which extents previous studies and includes the interaction between an array of droplets and the enveloping gas. The formulation...... is in fact the summation of 'local' droplet size distributions along the r-axis. A key parameter, which determines the yield and the shape of the deposit material, is the sticking efficiency. The sticking phenomenon is therefore incorporated into the deposition model. (C) 2002 Acta Materialia Inc. Published...... of the deposition model is accomplished using a 2D cylindrical heat flow model. This model is now coupled with an atomization model via a log-normal droplet size distribution. The coupling between the atomization and the deposition is accomplished by ensuring that the total droplet size distribution of the spray...

  19. Challenges in Modeling the Degradation of Ceramic Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    Devanathan, Ramaswami; Gao, Fei; Sun, Xin

    2011-09-01

    We identify the state of the art, gaps in current understanding, and key research needs in the area of modeling the long-term degradation of ceramic waste forms for nuclear waste disposition. The directed purpose of this report is to define a roadmap for Waste IPSC needs to extend capabilities of waste degradation to ceramic waste forms, which overlaps with the needs of the subconsinuum scale of FMM interests. The key knowledge gaps are in the areas of (i) methodology for developing reliable interatomic potentials to model the complex atomic-level interactions in waste forms; (ii) characterization of water interactions at ceramic surfaces and interfaces; and (iii) extension of atomic-level insights to the long time and distance scales relevant to the problem of actinide and fission product immobilization.

  20. Zero modes method and form factors in quantum integrable models

    Directory of Open Access Journals (Sweden)

    S. Pakuliak

    2015-04-01

    Full Text Available We study integrable models solvable by the nested algebraic Bethe ansatz and possessing GL(3-invariant R-matrix. Assuming that the monodromy matrix of the model can be expanded into series with respect to the inverse spectral parameter, we define zero modes of the monodromy matrix entries as the first nontrivial coefficients of this series. Using these zero modes we establish new relations between form factors of the elements of the monodromy matrix. We prove that all of them can be obtained from the form factor of a diagonal matrix element in special limits of Bethe parameters. As a result we obtain determinant representations for form factors of all the entries of the monodromy matrix.

  1. Challenges in Modeling the Degradation of Ceramic Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    Devanathan, Ramaswami; Gao, Fei; Sun, Xin

    2011-09-01

    We identify the state of the art, gaps in current understanding, and key research needs in the area of modeling the long-term degradation of ceramic waste forms for nuclear waste disposition. The directed purpose of this report is to define a roadmap for Waste IPSC needs to extend capabilities of waste degradation to ceramic waste forms, which overlaps with the needs of the subconsinuum scale of FMM interests. The key knowledge gaps are in the areas of (i) methodology for developing reliable interatomic potentials to model the complex atomic-level interactions in waste forms; (ii) characterization of water interactions at ceramic surfaces and interfaces; and (iii) extension of atomic-level insights to the long time and distance scales relevant to the problem of actinide and fission product immobilization.

  2. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  3. Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications

    Directory of Open Access Journals (Sweden)

    Jiajun Sun

    2017-09-01

    Full Text Available Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization. However, enormous privacy and security challenges need to be faced directly in real-life environments, such as cost privacies. In this paper, we investigate offline verifiable privacy-protection crowdsensing issues. We firstly present a general verifiable privacy-protection incentive mechanism for the offline homogeneous and heterogeneous sensing job model. In addition, we also propose a more complex verifiable privacy-protection incentive mechanism for the offline submodular sensing job model. The two mechanisms not only explore the private protection issues of users and platform, but also ensure the verifiable correctness of payments between platform and users. Finally, we demonstrate that the two mechanisms satisfy privacy-protection, verifiable correctness of payments and the same revenue as the generic one without privacy protection. Our experiments also validate that the two mechanisms are both scalable and efficient, and applicable for mobile devices in crowdsensing applications based on auctions, where the main incentive for the user is the remuneration.

  4. Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications.

    Science.gov (United States)

    Sun, Jiajun; Liu, Ningzhong

    2017-09-04

    Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization. However, enormous privacy and security challenges need to be faced directly in real-life environments, such as cost privacies. In this paper, we investigate offline verifiable privacy-protection crowdsensing issues. We firstly present a general verifiable privacy-protection incentive mechanism for the offline homogeneous and heterogeneous sensing job model. In addition, we also propose a more complex verifiable privacy-protection incentive mechanism for the offline submodular sensing job model. The two mechanisms not only explore the private protection issues of users and platform, but also ensure the verifiable correctness of payments between platform and users. Finally, we demonstrate that the two mechanisms satisfy privacy-protection, verifiable correctness of payments and the same revenue as the generic one without privacy protection. Our experiments also validate that the two mechanisms are both scalable and efficient, and applicable for mobile devices in crowdsensing applications based on auctions, where the main incentive for the user is the remuneration.

  5. 17 CFR Appendix to Subpart B of... - Model Forms

    Science.gov (United States)

    2010-04-01

    ...) REGULATIONS S-P AND S-AM Regulation S-AM: Limitations on Affiliate Marketing Pt. 248, Subpt. B, App. Appendix... such as “the group of companies.” 4. Substituting other types of affiliates covered by the notice for... Initial Opt Out Notice (Joint Notice) A-3—Model Form for Renewal Notice (Single-Affiliate Notice)...

  6. Star-forming galaxy models: Blending star formation into TREESPH

    Science.gov (United States)

    Mihos, J. Christopher; Hernquist, Lars

    1994-01-01

    We have incorporated star-formation algorithms into a hybrid N-body/smoothed particle hydrodynamics code (TREESPH) in order to describe the star forming properties of disk galaxies over timescales of a few billion years. The models employ a Schmidt law of index n approximately 1.5 to calculate star-formation rates, and explicitly include the energy and metallicity feedback into the Interstellar Medium (ISM). Modeling the newly formed stellar population is achieved through the use of hybrid SPH/young star particles which gradually convert from gaseous to collisionless particles, avoiding the computational difficulties involved in creating new particles. The models are shown to reproduce well the star-forming properties of disk galaxies, such as the morphology, rate of star formation, and evolution of the global star-formation rate and disk gas content. As an example of the technique, we model an encounter between a disk galaxy and a small companion which gives rise to a ring galaxy reminiscent of the Cartwheel (AM 0035-35). The primary galaxy in this encounter experiences two phases of star forming activity: an initial period during the expansion of the ring, and a delayed phase as shocked material in the ring falls back into the central regions.

  7. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  8. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    2007-01-01

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  9. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    2007-01-01

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...

  10. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...

  11. Privacy and Facebook

    Directory of Open Access Journals (Sweden)

    Ronan Comer

    2012-09-01

    Full Text Available Social Networking is continually growing and showing more possibilities. Facebook the leading social network site is approaching 1 billion members. Facebook guarantees more than friend requests and also acts as an excellent marketing tool for businesses. Social media is a technology allowing the nation to publish instantly and economically on the internet. It encourages live discussion on a huge range of topics, with not only friends, but businesses and consumers. Facebook serves 120 billion hits per day, stored 60 billion photos and generated 150TB (Terabytes of logs every day. Privacy - or lack of it - however has provoked outrage at various times in the media. This paper seeks to examine the ramifications of poor privacy management by Facebook.

  12. Performing privacy in schools

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Albrechtslund, Anders; Andersen, Lars Bo

    2017-01-01

    In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students....... School life involves a wide range of technologies, including smartphones, online communication platforms between teachers and parents, and social media. These and other surveillance-enabling services all contribute to the tracking of and by school children and shape their perceptions of privacy (Monahan...... and Torres, 2009; Selwyn, 2010; Taylor, 2013; Taylor & Rooney, 2016). The presentation reports findings from a qualitative study in which teachers and students between 12-16 from two Danish schools are interviewed. In addition, the teachers and students participate in workshops where experiments...

  13. A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing

    CERN Document Server

    Ahmed, Faraz; Liu, Alex X

    2013-01-01

    Online social networks are being increasingly used for analyzing various societal phenomena such as epidemiology, information dissemination, marketing and sentiment flow. Popular analysis techniques such as clustering and influential node analysis, require the computation of eigenvectors of the real graph's adjacency matrix. Recent de-anonymization attacks on Netflix and AOL datasets show that an open access to such graphs pose privacy threats. Among the various privacy preserving models, Differential privacy provides the strongest privacy guarantees. In this paper we propose a privacy preserving mechanism for publishing social network graph data, which satisfies differential privacy guarantees by utilizing a combination of theory of random matrix and that of differential privacy. The key idea is to project each row of an adjacency matrix to a low dimensional space using the random projection approach and then perturb the projected matrix with random noise. We show that as compared to existing approaches for ...

  14. Approximate Privacy: Foundations and Quantification

    CERN Document Server

    Feigenbaum, Joan; Schapira, Michael

    2009-01-01

    Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. We formulate communication-complexity-based definitions, both worst-case and average-case, of a problem's privacy-approximation ratio. We use our definitions to investigate the extent to which approximate privacy is achievable in two standard problems: the second-price Vickrey auction and the millionaires problem of Yao. For both the second-price Vickrey auction and the millionaires problem, we show that not only is perfect privacy impossible or infeasibly costly to achieve...

  15. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  16. BORDERS OF COMMUNICATION PRIVACY IN SLOVENIAN CRIMINAL PROCEDURE – CONSTITUTIONAL CHALLENGES

    Directory of Open Access Journals (Sweden)

    Sabina Zgaga

    2015-01-01

    Full Text Available Due to fast technological development and our constant communication protection of communication privacy in every aspect of our (legal life has become more important than ever before. Regarding protection of privacy in criminal procedure special emphasis should be given to the regulation of privacy in Slovenian Constitution and its interpretation in the case law of the Constitutional Court. This paper presents the definition of privacy and communication privacy in Slovenian constitutional law and exposes the main issues of communication privacy that have been discussed in the case law of the Constitutional Court in the last twenty years. Thereby the paper tries to show the general trend in the case law of Constitutional Court regarding the protection of communication privacy and to expose certain unsolved issues and unanswered challenges. Slovenian constitutional regulation of communication privacy is very protective, considering the broad definition of privacy and the strict conditions for encroachment of communication privacy. The case law of Slovenian Constitutional Court has also shown such trend, with the possible exception of the recent decision on a dynamic IP address. The importance of this decision is however significant, since it could be applicable to all forms of communication via internet, the prevailing form of communication nowadays. Certain challenges still lay ahead, such as the current proposal for the amendment of Criminal Procedure Act-M, which includes the use of IMSI catchers and numerous unanswered issues regarding data retention after the decisive annulment of its partial legal basis by the Constitutional Court.

  17. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  18. Constitutive modelling of aluminium alloy sheet at warm forming temperatures

    Science.gov (United States)

    Kurukuri, S.; Worswick, M. J.; Winkler, S.

    2016-08-01

    The formability of aluminium alloy sheet can be greatly improved by warm forming. However predicting constitutive behaviour under warm forming conditions is a challenge for aluminium alloys due to strong, coupled temperature- and rate-sensitivity. In this work, uniaxial tensile characterization of 0.5 mm thick fully annealed aluminium alloy brazing sheet, widely used in the fabrication of automotive heat exchanger components, is performed at various temperatures (25 to 250 °C) and strain rates (0.002 and 0.02 s-1). In order to capture the observed rate- and temperature-dependent work hardening behaviour, a phenomenological extended-Nadai model and the physically based (i) Bergstrom and (ii) Nes models are considered and compared. It is demonstrated that the Nes model is able to accurately describe the flow stress of AA3003 sheet at different temperatures, strain rates and instantaneous strain rate jumps.

  19. Degradation modeling of the ANL ceramic waste form

    Energy Technology Data Exchange (ETDEWEB)

    Fanning, T. H.; Morss, L. R.

    2000-03-28

    A ceramic waste form composed of glass-bonded sodalite is being developed at Argonne National Laboratory (ANL) for immobilization and disposition of the molten salt waste stream from the electrometallurgical treatment process for metallic DOE spent nuclear fuel. As part of the spent fuel treatment program at ANL, a model is being developed to predict the long-term release of radionuclides under repository conditions. Dissolution tests using dilute, pH-buffered solutions have been conducted at 40, 70, and 90 C to determine the temperature and pH dependence of the dissolution rate. Parameter values measured in these tests have been incorporated into the model, and preliminary repository performance assessment modeling has been completed. Results indicate that the ceramic waste form should be acceptable in a repository environment.

  20. Enabling secure and privacy preserving communications in smart grids

    CERN Document Server

    Li, Hongwei

    2014-01-01

    This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in sma

  1. Bed form dynamics in distorted lightweight scale models

    Science.gov (United States)

    Aberle, Jochen; Henning, Martin; Ettmer, Bernd

    2016-04-01

    The adequate prediction of flow and sediment transport over bed forms presents a major obstacle for the solution of sedimentation problems in alluvial channels because bed forms affect hydraulic resistance, sediment transport, and channel morphodynamics. Moreover, bed forms can affect hydraulic habitat for biota, may introduce severe restrictions to navigation, and present a major problem for engineering structures such as water intakes and groynes. The main body of knowledge on the geometry and dynamics of bed forms such as dunes originates from laboratory and field investigations focusing on bed forms in sand bed rivers. Such investigations enable insight into the physics of the transport processes, but do not allow for the long term simulation of morphodynamic development as required to assess, for example, the effects of climate change on river morphology. On the other hand, this can be achieved through studies with distorted lightweight scale models allowing for the modification of the time scale. However, our understanding of how well bed form geometry and dynamics, and hence sediment transport mechanics, are reproduced in such models is limited. Within this contribution we explore this issue using data from investigations carried out at the Federal Waterways and Research Institute in Karlsruhe, Germany in a distorted lightweight scale model of the river Oder. The model had a vertical scale of 1:40 and a horizontal scale of 1:100, the bed material consisted of polystyrene particles, and the resulting dune geometry and dynamics were measured with a high spatial and temporal resolution using photogrammetric methods. Parameters describing both the directly measured and up-scaled dune geometry were determined using the random field approach. These parameters (e.g., standard deviation, skewness, kurtosis) will be compared to prototype observations as well as to results from the literature. Similarly, parameters describing the lightweight bed form dynamics, which

  2. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  3. An Examination of Individual’s Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-Commerce: Using An Extension of the Technology Acceptance Model

    Directory of Open Access Journals (Sweden)

    Muniruddeen Lallmahamood

    2007-12-01

    Full Text Available This study explores the impact of perceived security and privacy on the intention to use Internet banking. An extended version of the technology acceptance model (TAM is used to examine the above perception. A survey was distributed, the 187 responses mainly from the urban cities in Malaysia, hav e generally agreed that security and privacy are still the main concerns while using Internet banking. The research model explains over half of the variance of the intention to use Internet banking [R 2 = 0.532 (adjusted], the unexplained 47 percent of variance suggests that the model may have excluded other possible factors influencing the acceptance of Internet banking. Interaction in the local language (Bahasa Malaysia did not have an impact on the ease of use of Internet banking. Internet security, Internet banking regulations and customers’ privacy would remain future challenges of Internet banking acceptance. The value of this study may provide an updated literature in the field of Internet banking acceptance in Malaysia

  4. Towards Industrial Application of Damage Models for Sheet Metal Forming

    Science.gov (United States)

    Doig, M.; Roll, K.

    2011-05-01

    Due to global warming and financial situation the demand to reduce the CO2-emission and the production costs leads to the permanent development of new materials. In the automotive industry the occupant safety is an additional condition. Bringing these arguments together the preferable approach for lightweight design of car components, especially for body-in-white, is the use of modern steels. Such steel grades, also called advanced high strength steels (AHSS), exhibit a high strength as well as a high formability. Not only their material behavior but also the damage behavior of AHSS is different compared to the performances of standard steels. Conventional methods for the damage prediction in the industry like the forming limit curve (FLC) are not reliable for AHSS. Physically based damage models are often used in crash and bulk forming simulations. The still open question is the industrial application of these models for sheet metal forming. This paper evaluates the Gurson-Tvergaard-Needleman (GTN) model and the model of Lemaitre within commercial codes with a goal of industrial application.

  5. Assessing the privacy policies in mobile personal health records.

    Science.gov (United States)

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs.

  6. Octet baryon electromagnetic form factors in a relativistic quark model

    CERN Document Server

    Ramalho, G

    2011-01-01

    We study the octet baryon electromagnetic properties by applying the covariant spectator quark model, and provide covariant parametrization that can be used to study baryon electromagnetic reactions. While we use the lattice QCD data in the large pion mass regime (small pion cloud effects) to determine the parameters of the model in the valence quark sector, we use the nucleon physical and octet baryon magnetic moment data to parameterize the pion cloud contributions. The valence quark contributions for the octet baryon electromagnetic form factors are estimated by extrapolating the lattice parametrization in the large pion mass regime to the physical regime. As for the pion cloud contributions, we parameterize them in a covariant, phenomenological manner, combined with SU(3) symmetry. We also discuss the impact of the pion cloud effects on the octet baryon electromagnetic form factors and their radii.

  7. Octet Baryon Electromagnetic Form Factors in a Relativistic Quark Model

    Energy Technology Data Exchange (ETDEWEB)

    Gilberto Ramalho, Kazuo Tsushima

    2011-09-01

    We study the octet baryon electromagnetic properties by applying the covariant spectator quark model, and provide covariant parametrization that can be used to study baryon electromagnetic reactions. While we use the lattice QCD data in the large pion mass regime (small pion cloud effects) to determine the parameters of the model in the valence quark sector, we use the nucleon physical and octet baryon magnetic moment data to parameterize the pion cloud contributions. The valence quark contributions for the octet baryon electromagnetic form factors are estimated by extrapolating the lattice parametrization in the large pion mass regime to the physical regime. As for the pion cloud contributions, we parameterize them in a covariant, phenomenological manner, combined with SU(3) symmetry. We also discuss the impact of the pion cloud effects on the octet baryon electromagnetic form factors and their radii.

  8. Information privacy in organizations: empowering creative and extrarole performance.

    Science.gov (United States)

    Alge, Bradley J; Ballinger, Gary A; Tangirala, Subrahmaniam; Oakley, James L

    2006-01-01

    This article examines the relationship of employee perceptions of information privacy in their work organizations and important psychological and behavioral outcomes. A model is presented in which information privacy predicts psychological empowerment, which in turn predicts discretionary behaviors on the job, including creative performance and organizational citizenship behavior (OCB). Results from 2 studies (Study 1: single organization, N=310; Study 2: multiple organizations, N=303) confirm that information privacy entails judgments of information gathering control, information handling control, and legitimacy. Moreover, a model linking information privacy to empowerment and empowerment to creative performance and OCBs was supported. Findings are discussed in light of organizational attempts to control employees through the gathering and handling of their personal information. (c) 2006 APA, all rights reserved.

  9. Models of Anisotropic Creep in Integral Wing Panel Forming Processes

    Science.gov (United States)

    Oleinikov, A. I.; Oleinikov, A. A.

    2016-08-01

    For a sufficiently wide range of stresses the titanic and aluminummagnesium alloys, as a rule, strained differently in the process of creep under tension and compression along a fixed direction. There are suggested constitutive relations for the description of the steady-state creep of transversely isotropic materials with different tension and compression characteristics. Experimental justification is given to the proposed constitutive equations. Modeling of forming of wing panels of the aircraft are considered.

  10. Baryon octet electromagnetic form factors in a confining NJL model

    Directory of Open Access Journals (Sweden)

    Manuel E. Carrillo-Serrano

    2016-08-01

    Full Text Available Electromagnetic form factors of the baryon octet are studied using a Nambu–Jona-Lasinio model which utilizes the proper-time regularization scheme to simulate aspects of colour confinement. In addition, the model also incorporates corrections to the dressed quarks from vector meson correlations in the t-channel and the pion cloud. Comparison with recent chiral extrapolations of lattice QCD results shows a remarkable level of consistency. For the charge radii we find the surprising result that rEp

  11. Modeling Perception of 3D Forms Using Fuzzy Knowledge Bases

    DEFF Research Database (Denmark)

    Achiche, Sofiane; Ahmed, Saeema

    2009-01-01

    the aesthetics of their products are likely to be perceived are of value. In this paper the authors propose an approach to formalize the relationship between geometric information of a 3D object and the intended perception using fuzzy logic. 3D objects (shapes) created by design engineering students to evoke...... a certain perception were analysed. Three different fuzzy logic models, with different input variables, for evaluating massiveness and lightness in a form are proposed. The uthors identified geometric information as inputs of the fuzzy model and developed a set of fuzzy if/then rules to map...... the relationships between the fuzzy sets on each input premise and the output premise. In our case the output premise of the fuzzy logic model is the level of belonging to the design context (perception). An evaluation of how users perceived the shapes was conducted to validate the fuzzy logic models and showed...

  12. Deriving a Set of Privacy Specific Heuristics for the Assessment of PHRs (Personal Health Records).

    Science.gov (United States)

    Furano, Riccardo F; Kushniruk, Andre; Barnett, Jeff

    2017-01-01

    With the emergence of personal health record (PHR) platforms becoming more widely available, this research focused on the development of privacy heuristics to assess PHRs regarding privacy. Existing sets of heuristics are typically not application specific and do not address patient-centric privacy as a main concern prior to undergoing PHR procurement. A set of privacy specific heuristics were developed based on a scoping review of the literature. An internet-based commercially available, vendor specific PHR application was evaluated using the derived set of privacy specific heuristics. The proposed set of privacy specific derived heuristics is explored in detail in relation to ISO 29100. The assessment of the internet-based commercially available, vendor specific PHR application indicated numerous violations. These violations were noted within the study. It is argued that the new derived privacy heuristics should be used in addition to Nielsen's well-established set of heuristics. Privacy specific heuristics could be used to assess PHR portal system-level privacy mechanisms in the procurement process of a PHR application and may prove to be a beneficial form of assessment to prevent the selection of a PHR platform with a poor privacy specific interface design.

  13. Personal Information Privacy: A Multi-Party Endeavor

    OpenAIRE

    Sue Conger

    2009-01-01

    Individuals can no longer manage their own personal information privacy. Rather, organizations with which individuals interact must recognize vulnerabilities and actively manage their data to guarantee known data sharing and to prevent data leakages. A more complete model of consumers’ personal information privacy that includes not only data gathering, but also data sharing and data leakage is presented and defended here.

  14. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    . To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  15. A Simple and Accurate Closed-Form EGN Model Formula

    CERN Document Server

    Poggiolini, P; Carena, A; Forghieri, F

    2015-01-01

    The GN model of non-linear fiber propagation has been shown to overestimate the variance of non-linearity due to the signal Gaussianity approximation, leading to maximum reach predictions for typical optical systems which may be pessimistic by about 5% to 15%, depending on fiber type and system set-up. Various models have been proposed which improve over the GN model accuracy. One of them is the EGN model, which completely removes the Gaussianity approximation from all non-linear interference (NLI) components. The EGN model is, however, substantially more complex than the GN model. Recently, we proposed a simple closed-form formula which permits to approximate the EGN model, starting from the GN. It was however limited to all-identical, equispaced channels, and did not correct single-channel NLI (also called SCI). In this follow-up contribution, we propose an improved version which both allows to address non-identical channels and corrects the SCI contribution as well. Extensive simulative testing shows the n...

  16. Electrochemical Corrosion Studies for Modeling Metallic Waste Form Release Rates

    Energy Technology Data Exchange (ETDEWEB)

    Poineau, Frederic [Univ. of Nevada, Las Vegas, NV (United States); Tamalis, Dimitri [Florida Memorial Univ., Miami Gardens, FL (United States)

    2016-08-01

    The isotope 99Tc is an important fission product generated from nuclear power production. Because of its long half-life (t1/2 = 2.13 ∙ 105 years) and beta-radiotoxicity (β⁻ = 292 keV), it is a major concern in the long-term management of spent nuclear fuel. In the spent nuclear fuel, Tc is present as an alloy with Mo, Ru, Rh, and Pd called the epsilon-phase, the relative amount of which increases with fuel burn-up. In some separation schemes for spent nuclear fuel, Tc would be separated from the spent fuel and disposed of in a durable waste form. Technetium waste forms under consideration include metallic alloys, oxide ceramics and borosilicate glass. In the development of a metallic waste form, after separation from the spent fuel, Tc would be converted to the metal, incorporated into an alloy and the resulting waste form stored in a repository. Metallic alloys under consideration include Tc–Zr alloys, Tc–stainless steel alloys and Tc–Inconel alloys (Inconel is an alloy of Ni, Cr and iron which is resistant to corrosion). To predict the long-term behavior of the metallic Tc waste form, understanding the corrosion properties of Tc metal and Tc alloys in various chemical environments is needed, but efforts to model the behavior of Tc metallic alloys are limited. One parameter that should also be considered in predicting the long-term behavior of the Tc waste form is the ingrowth of stable Ru that occurs from the radioactive decay of 99Tc (99Tc → 99Ru + β⁻). After a geological period of time, significant amounts of Ru will be present in the Tc and may affect its corrosion properties. Studying the effect of Ru on the corrosion behavior of Tc is also of importance. In this context, we studied the electrochemical behavior of Tc metal, Tc-Ni alloys (to model Tc-Inconel alloy) and Tc-Ru alloys in acidic media. The study of Tc-U alloys has also been performed in order to better understand the

  17. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  18. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  19. 基于 P2 P网络模型的Web搜索引擎用户隐私保护%User privacy protection schema in WSE based on P2P network model

    Institute of Scientific and Technical Information of China (English)

    徐洋; 王鹏举; 张焕国; 谢晓尧

    2016-01-01

    For the issues that user privacy violations in WSE,this paper proposed a user privacy protection scheme in WSE based on P2P network model.It used P2P network architecture to group the users according to their interests,and the con-struction of multilayer privacy protection mechanisms.The user query was submitted by nodes forwards,WSE could only ob-tain brief characteristics of queries and provide the corresponding services.At the same time,this scheme protected the honest users,and exposed the selfish users to WSE.Experimental results show that the proposed scheme can protect user privacy well and provide good service quality.%针对网页搜索引擎(Web search engine,WSE)中存在侵犯用户隐私的问题,提出一种基于P2P网络模型的WS E前端用户隐私保护方案。利用P2 P网络架构来将用户根据他们的爱好进行分组,并构建多层隐私保护机制,通过节点转发来提交用户查询,WSE只能获得一组查询的简要特征并提供相应的服务;同时保护诚实用户不被WSE暴露,并将自私用户暴露给WSE。实验结果表明,该方案能够很好地保护用户隐私,并提供良好的服务质量。

  20. Preserving Differential Privacy for Similarity Measurement in Smart Environments

    Directory of Open Access Journals (Sweden)

    Kok-Seng Wong

    2014-01-01

    Full Text Available Advances in both sensor technologies and network infrastructures have encouraged the development of smart environments to enhance people’s life and living styles. However, collecting and storing user’s data in the smart environments pose severe privacy concerns because these data may contain sensitive information about the subject. Hence, privacy protection is now an emerging issue that we need to consider especially when data sharing is essential for analysis purpose. In this paper, we consider the case where two agents in the smart environment want to measure the similarity of their collected or stored data. We use similarity coefficient function FSC as the measurement metric for the comparison with differential privacy model. Unlike the existing solutions, our protocol can facilitate more than one request to compute FSC without modifying the protocol. Our solution ensures privacy protection for both the inputs and the computed FSC results.

  1. Perceived Speech Privacy in Computer Simulated Open-plan Offices

    DEFF Research Database (Denmark)

    Pop, Claudiu B.; Rindel, Jens Holger

    2005-01-01

    parameter that correlates well with the perceived degree of speech privacy and to derive a clear method for evaluating the acoustic conditions in open plan offices. Acoustic measurements were carried out in an open plan office, followed by data analysis at the Acoustic Department, DTU. A computer model......In open plan offices the lack of speech privacy between the workstations is one of the major acoustic problems. Improving the speech privacy in an open plan design is therefore the main concern for a successful open plan environment. The project described in this paper aimed to find an objective...... of the actual office was developed using the ODEON room acoustic software, and this allowed a systematic investigation of the possible influence of various acoustic conditions on the speech privacy. Four different versions of acoustic treatment of the office were used and three different distances from...

  2. GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION

    Directory of Open Access Journals (Sweden)

    R. Praveena Priyadarsini

    2011-04-01

    Full Text Available Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-diversity and t-closeness and data perturbation. In this paper k-anonymity privacy protection technique is applied to high dimensional datasets like adult and census. since, both the data sets are high dimensional, feature subset selection method like Gain Ratio is applied and the attributes of the datasets are ranked and low ranking attributes are filtered to form new reduced data subsets. K-anonymization privacy preservation technique is then applied on reduced datasets. The accuracy of the privacy preserved reduced datasets and the original datasets are compared for their accuracy on the two functionalities of data mining namely classification and clustering using naïve Bayesian and k-means algorithm respectively. Experimental results show that classification and clustering accuracy are comparatively the same for reduced k-anonym zed datasets and the original data sets.

  3. Distinguishing interactions in 3-form dark energy models

    CERN Document Server

    Morais, João; Kumar, K Sravan; Marto, João; Tavakoli, Yaser

    2016-01-01

    In this paper we consider 3-form dark energy (DE) models with interactions in the dark sector. We aim to distinguish the phenomenological interactions that are defined through the dark matter (DM) and the DE energy densities. We do our analysis mainly in two stages. In the first stage, we identify the non-interacting 3-form DE model which generically leads to an abrupt late-time cosmological event which is known as the little sibling of the Big Rip (LSBR). We classify the interactions which can possibly avoid this late-time abrupt event. We also study the parameter space of the model that is consistent with the interaction between DM and DE energy densities at present as indicated by recent studies based on BAO and SDSS data. In the later stage, we observationally distinguish those interactions using the statefinder hierarchy parameters $\\{ S_{3}^{(1)}\\,,\\, S_{4}^{(1)}\\} \\,,\\,\\{ S_{3}^{(1)}\\,,\\, S_{5}^{(1)}\\} .$ We also compute the growth factor parameter $\\epsilon(z)$ for the various interactions we consider...

  4. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  5. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  6. Multi-Scalar Modelling for Free-form Timber Structures

    DEFF Research Database (Denmark)

    Poinet, Paul; Nicholas, Paul; Tamke, Martin

    2016-01-01

    This paper describes a new conceptual and computational framework that employs Multi-Scalar Modelling techniques (Weinan [22]) in order to overcome the problem of big data management and to enable a more integrative digital workflow during the geometrical discretization of spatial structures.......The research explores the design probe of free-form structures composed of glue-laminated timber beams and looks at the different types of data that need to be shared among each discipline and across multiple scales from which different levels of resolution can be defined. A particular focus lies...

  7. Material and natural processes as form modelling principles in sculpting

    OpenAIRE

    Smole, Mateja

    2016-01-01

    My final thesis is an analysis of ideas and practical experience, which formed in the process of unfolding various works of art. The underlying questions, which one notices throughout my thesis, are: How does a work of art come to life, what happens with the materials during the modelling process, where will the work of art be displayed and what impact will the environment have on it, and last but not least, what will the interaction between the artist and the public be, where and in what way...

  8. New Collaborative Filtering Algorithms Based on SVD++ and Differential Privacy

    Directory of Open Access Journals (Sweden)

    Zhengzheng Xian

    2017-01-01

    Full Text Available Collaborative filtering technology has been widely used in the recommender system, and its implementation is supported by the large amount of real and reliable user data from the big-data era. However, with the increase of the users’ information-security awareness, these data are reduced or the quality of the data becomes worse. Singular Value Decomposition (SVD is one of the common matrix factorization methods used in collaborative filtering, which introduces the bias information of users and items and is realized by using algebraic feature extraction. The derivative model SVD++ of SVD achieves better predictive accuracy due to the addition of implicit feedback information. Differential privacy is defined very strictly and can be proved, which has become an effective measure to solve the problem of attackers indirectly deducing the personal privacy information by using background knowledge. In this paper, differential privacy is applied to the SVD++ model through three approaches: gradient perturbation, objective-function perturbation, and output perturbation. Through theoretical derivation and experimental verification, the new algorithms proposed can better protect the privacy of the original data on the basis of ensuring the predictive accuracy. In addition, an effective scheme is given that can measure the privacy protection strength and predictive accuracy, and a reasonable range for selection of the differential privacy parameter is provided.

  9. RANS turbulence model form uncertainty quantification for wind engineering flows

    Science.gov (United States)

    Gorle, Catherine; Zeoli, Stephanie; Bricteux, Laurent

    2016-11-01

    Reynolds-averaged Navier-Stokes simulations with linear eddy-viscosity turbulence models are commonly used for modeling wind engineering flows, but the use of the results for critical design decisions is hindered by the limited capability of the models to correctly predict bluff body flows. A turbulence model form uncertainty quantification (UQ) method to define confidence intervals for the results could remove this limitation, and promising results were obtained in a previous study of the flow in downtown Oklahoma City. The objective of the present study is to further investigate the validity of these results by considering the simplified test case of the flow around a wall-mounted cube. DNS data is used to determine: 1. whether the marker, which identifies regions that deviate from parallel shear flow, is a good indicator for the regions where the turbulence model fails, and 2. which Reynolds stress perturbations, in terms of the tensor magnitude and the eigenvalues and eigenvectors of the normalized anisotropy tensor, can capture the uncertainty in the flow field. A comparison of confidence intervals obtained with the UQ method and the DNS solution indicates that the uncertainty in the velocity field can be captured correctly in a large portion of the flow field.

  10. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  11. Employee Privacy Rights: A Management Guide.

    Science.gov (United States)

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  12. Theoretical model for forming limit diagram predictions without initial inhomogeneity

    Science.gov (United States)

    Gologanu, Mihai; Comsa, Dan Sorin; Banabic, Dorel

    2013-05-01

    We report on our attempts to build a theoretical model for determining forming limit diagrams (FLD) based on limit analysis that, contrary to the well-known Marciniak and Kuczynski (M-K) model, does not assume the initial existence of a region with material or geometrical inhomogeneity. We first give a new interpretation based on limit analysis for the onset of necking in the M-K model. Considering the initial thickness defect along a narrow band as postulated by the M-K model, we show that incipient necking is a transition in the plastic mechanism from one of plastic flow in both the sheet and the band to another one where the sheet becomes rigid and all plastic deformation is localized in the band. We then draw on some analogies between the onset of necking in a sheet and the onset of coalescence in a porous bulk body. In fact, the main advance in coalescence modeling has been based on a similar limit analysis with an important new ingredient: the evolution of the spatial distribution of voids, due to the plastic deformation, creating weaker regions with higher porosity surrounded by sound regions with no voids. The onset of coalescence is precisely the transition from a mechanism of plastic deformation in both regions to another one, where the sound regions are rigid. We apply this new ingredient to a necking model based on limit analysis, for the first quadrant of the FLD and a porous sheet. We use Gurson's model with some recent extensions to model the porous material. We follow both the evolution of a homogeneous sheet and the evolution of the distribution of voids. At each moment we test for a potential change of plastic mechanism, by comparing the stresses in the uniform region to those in a virtual band with a larger porosity. The main difference with the coalescence of voids in a bulk solid is that the plastic mechanism for a sheet admits a supplementary degree of freedom, namely the change in the thickness of the virtual band. For strain ratios close to

  13. Prior Negative Experience, Online Privacy Concerns and Intent to Disclose Personal Information in Chinese Social Media

    OpenAIRE

    Hongwei “Chris†Yang

    2014-01-01

    A paper survey of 489 Chinese college students was conducted in spring, 2012 to test a conceptual model of online information disclosure in social media. It shows that young Chinese SNS users' prior negative experience of online disclosure significantly increased their online privacy concerns and their perceived risk. Their online privacy concerns undermined their trust of online companies, marketers and laws to protect privacy and elevated their perceived risk. Their trust strongly predicted...

  14. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  15. Nursing professional facing patient privacy

    Directory of Open Access Journals (Sweden)

    Fidel López Espuela

    2010-05-01

    Full Text Available Privacy of patients admitted to the hospital is played down in favour of other needs considered more basic by the healthcare system and more related to the disease than to patients themselves. Situations and factors where privacy is damaged are frequent, but it is known that when these are avoided by professionals’ attitude, through strategies and different mechanisms, it becomes one of the most satisfactory elements to patients.Objectives: To identify and analyze situations and factors which affect privacy in hospital environment as well as the adaptation capacity of patients to them.Methodology: Phenomenological, qualitative research. By means of discussion groups with professionals, the following questions where answered: ‘What do professionals understand by privacy? Which situations and factors jeopardize it during the hospital stay? How do they think patients get adapted?Results: The concept of privacy is complex, personal and non-transferable. Situations in which it is jeopardized were divided in 5 main areas. Numerous behaviors regarding adaptation of patients to these were collected.Discussion: Although there is little nursery research referring to privacy and its defense in the professional-patient relationship field, concern about this aspect always shown by nursery staff stands out.As a conclussion, we observe the need to complement this research with the perception patients have about these same questions, establishing the importance they give to privacy.

  16. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  17. A Privacy Manager for Cloud Computing

    Science.gov (United States)

    Pearson, Siani; Shen, Yun; Mowbray, Miranda

    We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.

  18. INFORMATIONAL-ANALYTIC MODEL OF REGIONAL PROJECT PORTFOLIO FORMING

    Directory of Open Access Journals (Sweden)

    I. A. Osaulenko

    2016-01-01

    Full Text Available The article is devoted to the problem of regional project portfolio management in context of interaction of the regional development’s motive forces interaction. The features of innovation development on the regional level and their influence on the portfolio forming process considered. An existing approaches for portfolio modelling and formal criterion of the projects selection analyzed. At the same time the organization of key subjects of regional development interaction described. The aim of the article is investigation of informational aspects of project selection in process of the main development’s motive forces interaction and analytic model of portfolio filling validation. At that an inclination of stakeholders to reach a consensus taking into account. The Triple Helix conception using for concrete definition of the functions of the regional development’s motive forces. Asserted, that any component of innovation triad «science–business–government» can be an initiator of regional project, but it need to support two another components. Non-power interaction theory using for investigation of subjects interrelations in process of joint activity proposed. One of the key concept of the theory is information distance. It characterizes inclination of the parties to reach a consensus based on statistics. Projections of information distance onto directions of development axes using for more accurate definition of mutual positions in the all lines of development proposed. Another important parameter of the model which has an influence on the project support is awareness of stakeholders about it. Formalized description of project in the form of fast set of parameters proposes to use for determination of the awareness. The weighting coefficients for each parameter by expert way. Simultaneously the precision of the each parameter setting for all presented projects determines. On the base of appointed values of information distances and

  19. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  20. A secure data privacy preservation for on-demand

    Directory of Open Access Journals (Sweden)

    Dhasarathan Chandramohan

    2017-04-01

    Full Text Available This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in business era if authoritarians misuse secret information. Software interruptions in steeling digital data in the name of third party services. Liability in digital secrecy for the business continuity isolation, mishandling causing privacy breaching the vicinity and its preventive phenomenon is scrupulous in the cloud, where a huge amount of data is stored and maintained enormously. In this developing IT-world toward cloud, users privacy protection is becoming a big question , albeit cloud computing made changes in the computing field by increasing its effectiveness, efficiency and optimization of the service environment etc, cloud users data and their identity, reliability, maintainability and privacy may vary for different CPs (cloud providers. CP ensures that the user’s proprietary information is maintained more secretly with current technologies. More remarkable occurrence is even the cloud provider does not have suggestions regarding the information and the digital data stored and maintained globally anywhere in the cloud. The proposed system is one of the obligatory research issues in cloud computing. We came forward by proposing the Privacy Preserving Model to Prevent Digital Data Loss in the Cloud (PPM–DDLC. This proposal helps the CR (cloud requester/users to trust their proprietary information and data stored in the cloud.

  1. A Scalable Privacy Preserving Scheme In Vehicular Network

    Institute of Scientific and Technical Information of China (English)

    YAN Gong-jun; SHI Hui; Awny Alnusair; Matthew Todd Bradley

    2014-01-01

    Vehicles enlisted with computing, sensing and communicating devices can create vehicular networks, a subset of cooperative systems in heterogeneous environments, aiming at improving safety and entertainment in traffic. In vehicular networks, a vehicle’s identity is associated to its owner’s identity as a unique linkage. Therefore, it is of importance to protect privacy of vehicles from being possibly tracked. Obviously, the privacy protection must be scalable because of the high mobility and large population of vehicles. In this work, we take a non-trivial step towards protecting privacy of vehicles. As privacy draws public concerns, we firstly present privacy implications of operational challenges from the public policy perspective. Additionally, we envision vehicular networks as geographically partitioned subnetworks (cells). Each subnetwork maintains a list of pseudonyms. Each pseudonym includes the cell’s geographic id and a random number as host id. Before starting communication, vehicles need to request a pseudonym on demand from pseudonym server. In order to improve utilization of pseudonyms, we address a stochastic model with time-varying arrival and departure rates. Our main contribution includes:1) proposing a scalable and effective algorithm to protect privacy; 2) providing analytical results of probability, variance and expected number of requests on pseudonym servers. The empirical results confirm the accuracy of our analytical predictions.

  2. The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security

    Directory of Open Access Journals (Sweden)

    Elizabeth Fife

    2012-07-01

    Full Text Available A continuing stream of new mobile data services are being released that rely upon the collection of personal data to support a business model. New technologies including facial recognition, sensors and Near Field Communications (NFC will increasingly become a part of everyday services and applications that challenge traditional concepts of individual privacy. The average person as well as the “tech‐savvy” mobile phone user may not yet be fully aware of the extent to which their privacy and security are being affected through their mobile activities and how comparable this situation is to personal computer usage. We investigate perceptions and usage of mobile data services that appear to have specific privacy and security sensitivities, specifically social networking,\tbanking/payments\tand\thealth‐related activities. Our annual survey of smartphone users in the U.S. and Japan is presented from 2011. This nationally representative survey data is used to show demographic and cultural differences, and substantiate our hypotheses about the links between use and privacy concerns

  3. Forming chondrules in impact splashes. I. Radiative cooling model

    Energy Technology Data Exchange (ETDEWEB)

    Dullemond, Cornelis Petrus; Stammler, Sebastian Markus [Institute for Theoretical Astrophysics, Heidelberg University, Albert-Ueberle-Strasse 2, D-69120 Heidelberg (Germany); Johansen, Anders [Lund Observatory, Department of Astronomy and Theoretical Physics, Lund University, Box 43, SE-22100 Lund (Sweden)

    2014-10-10

    The formation of chondrules is one of the oldest unsolved mysteries in meteoritics and planet formation. Recently an old idea has been revived: the idea that chondrules form as a result of collisions between planetesimals in which the ejected molten material forms small droplets that solidify to become chondrules. Pre-melting of the planetesimals by radioactive decay of {sup 26}Al would help produce sprays of melt even at relatively low impact velocity. In this paper we study the radiative cooling of a ballistically expanding spherical cloud of chondrule droplets ejected from the impact site. We present results from numerical radiative transfer models as well as analytic approximate solutions. We find that the temperature after the start of the expansion of the cloud remains constant for a time t {sub cool} and then drops with time t approximately as T ≅ T {sub 0}[(3/5)t/t {sub cool} + 2/5]{sup –5/3} for t > t {sub cool}. The time at which this temperature drop starts t {sub cool} depends via an analytical formula on the mass of the cloud, the expansion velocity, and the size of the chondrule. During the early isothermal expansion phase the density is still so high that we expect the vapor of volatile elements to saturate so that no large volatile losses are expected.

  4. Multi-Scalar Modelling for Free-form Timber Structures

    DEFF Research Database (Denmark)

    Poinet, Paul; Nicholas, Paul; Tamke, Martin;

    2016-01-01

    This paper describes a new conceptual and computational framework that employs Multi-Scalar Modelling techniques (Weinan [22]) in order to overcome the problem of big data management and to enable a more integrative digital workflow during the geometrical discretization of spatial structures.......The research explores the design probe of free-form structures composed of glue-laminated timber beams and looks at the different types of data that need to be shared among each discipline and across multiple scales from which different levels of resolution can be defined. A particular focus lies...... in the segmentation strategy of glue-laminated timber structures that depend on structural requirements and the different types of constraints related to fabrication, transportation and assembly. Where current working practices decouple segmentation processes within a discrete digital workflow, this research aims...

  5. Hydrological Modeling of the Jezero Crater Outlet-Forming Flood

    Science.gov (United States)

    Fassett, Caleb I.; Goudge, Timothy A.

    2017-01-01

    Jezero crater is a site of prime scientific interest because it was a lake early in Mars history. Preserved clay- and carbonate-bearing sedimentary fans on Jezero's western and northwestern margin (Fig. 2) are accessible to future exploration. Geologic context [1] and stratigraphic analysis of the western fan strongly support the interpretation that these fans were deposited as deltas into the lake. This has helped establish Jezero as one of the final candidate landing sites for Mars 2020. The high level of certainty that Jezero was a lake results from the existence of its outlet valley, which required filling of the crater to form [e.g., 1,4]. Here, we specifically focus on how this outlet valley was carved by the dam breach flood that eroded the eastern crater rim. We have completed preliminary modeling in both 1D and 2D of the outlet's formation.

  6. Advances in Constitutive and Failure Models for Sheet Forming Simulation

    Science.gov (United States)

    Yoon, Jeong Whan; Stoughton, Thomas B.

    2016-08-01

    Non-Associated Flow Rule (Non-AFR) can be used as a convenient way to account for anisotropic material response in metal deformation processes, making it possible for example, to eliminate the problem of the anomalous yielding in equibiaxial tension that is mistakenly attributed to limitations of the quadratic yield function, but may instead be attributed to the Associated Flow Rule (AFR). Seeing as in Non-AFR based models two separate functions can be adopted for yield and plastic potential, there is no constraint to which models are used to describe each of them. In this work, the flexible combination of two different yield criteria as yield function and plastic potential under Non-AFR is proposed and evaluated. FE simulations were carried so as to verify the accuracy of the material directionalities predicted using these constitutive material models. The stability conditions for non-associated flow connected with the prediction of yield point elongation are also reviewed. Anisotropic distortion hardening is further incorporated under non-associated flow. It has been found that anisotropic hardening makes the noticeable improvements for both earing and spring-back predictions. This presentation is followed by a discussion of the topic of the forming limit & necking, the evidence in favor of stress analysis, and the motivation for the development of a new type of forming limit diagram based on the polar effective plastic strain (PEPS) diagram. In order to connect necking to fracture in metals, the stress-based necking limit is combined with a stress- based fracture criterion in the principal stress, which provides an efficient method for the analysis of necking and fracture limits. The concept for the PEPS diagram is further developed to cover the path-independent PEPS fracture which is compatible with the stress-based fracture approach. Thus this fracture criterion can be utilized to describe the post-necking behavior and to cover nonlinear strain-path. Fracture

  7. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  8. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  9. Preserving Privacy in Transparency Logging

    OpenAIRE

    Pulls, Tobias

    2015-01-01

    The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service pr...

  10. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  11. Differential Privacy versus Quantitative Information Flow

    CERN Document Server

    Alvim, Mário S; Degano, Pierpaolo; Palamidessi, Catuscia

    2010-01-01

    Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities of two different entries to originate a certain answer is bound by e^\\epsilon. In the fields of anonymity and information flow there is a similar concern for controlling information leakage, i.e. limiting the possibility of inferring the secret information from the observables. In recent years, researchers have proposed to quantify the leakage in terms of the information-theoretic notion of mutual information. There are two main approaches that fall in this category: One based on Shannon entropy, and one based on R\\'enyi's min entropy. The latter has connection with the so-called Bayes risk, which expresses the probability of guessing the secret. In this paper, we show how to model the query system in terms of an information-theoretic channel, and we compare the notion of differen...

  12. Universally Utility-Maximizing Privacy Mechanisms

    CERN Document Server

    Ghosh, Arpita; Sundararajan, Mukund

    2008-01-01

    A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Privacy can be rigorously quantified using the framework of {\\em differential privacy}, which requires that a mechanism's output distribution is nearly the same (in a strong sense) whether or not a given database row is included or excluded. In this paper, we pursue much strong and general utility guarantees. We seek a mechanism that guarantees near-optimal utility to every potential user, independent of its side information. Formally, we model the side information of a potential user as a prior distribution over query results. An interaction between a user and a mechanism induces a posterior distribution, and we define the utility of the mechanism for this user as the accuracy of this posterior, as quantified via a user-specific loss function. A differentially private mechanism $M$ is (near-)optimal for a given user $u$ if $u$ derives (almost) as much utility from $M$ a...

  13. Numerical Modeling of Tube Forming by HPTR Cold Pilgering Process

    Science.gov (United States)

    Sornin, D.; Pachón-Rodríguez, E. A.; Vanegas-Márquez, E.; Mocellin, K.; Logé, R.

    2016-09-01

    For new fast-neutron sodium-cooled Generation IV nuclear reactors, the candidate cladding materials for the very strong burn-up are ferritic and martensitic oxide dispersion strengthened grades. Classically, the cladding tube is cold formed by a sequence of cold pilger milling passes with intermediate heat treatments. This process acts upon the geometry and the microstructure of the tubes. Consequently, crystallographic texture, grain sizes and morphologies, and tube integrity are highly dependent on the pilgering parameters. In order to optimize the resulting mechanical properties of cold-rolled cladding tubes, it is essential to have a thorough understanding of the pilgering process. Finite Element Method (FEM) models are used for the numerical predictions of this task; however, the accuracy of the numerical predictions depends not only on the type of constitutive laws but also on the quality of the material parameters identification. Therefore, a Chaboche-type law which parameters have been identified on experimental observation of the mechanical behavior of the material is used here. As a complete three-dimensional FEM mechanical analysis of the high-precision tube rolling (HPTR) cold pilgering of tubes could be very expensive, only the evolution of geometry and deformation is addressed in this work. The computed geometry is compared to the experimental one. It is shown that the evolution of the geometry and deformation is not homogeneous over the circumference. Moreover, it is exposed that the strain is nonhomogeneous in the radial, tangential, and axial directions. Finally, it is seen that the dominant deformation mode of a material point evolves during HPTR cold pilgering forming.

  14. Factors and Predictors of Online Security and Privacy Behavior

    Directory of Open Access Journals (Sweden)

    Goran Bubaš

    2008-12-01

    Full Text Available Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1 and data loss on the home computer (C2 on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.

  15. Modeling meander morphodynamics over self-formed heterogeneous floodplains

    Science.gov (United States)

    Bogoni, Manuel; Putti, Mario; Lanzoni, Stefano

    2017-06-01

    This work addresses the signatures embedded in the planform geometry of meandering rivers consequent to the formation of floodplain heterogeneities as the river bends migrate. Two geomorphic features are specifically considered: scroll bars produced by lateral accretion of point bars at convex banks and oxbow lake fills consequent to neck cutoffs. The sedimentary architecture of these geomorphic units depends on the type and amount of sediment, and controls bank erodibility as the river impinges on them, favoring or contrasting the river migration. The geometry of numerically generated planforms obtained for different scenarios of floodplain heterogeneity is compared to that of natural meandering paths. Half meander metrics and spatial distribution of channel curvatures are used to disclose the complexity embedded in meandering geometry. Fourier Analysis, Principal Component Analysis, Singular Spectrum Analysis and Multivariate Singular Spectrum Analysis are used to emphasize the subtle but crucial differences which may emerge between apparently similar configurations. A closer similarity between observed and simulated planforms is attained when fully coupling flow and sediment dynamics (fully-coupled models) and when considering self-formed heterogeneities that are less erodible than the surrounding floodplain.

  16. A Random Matrix Approach for Quantifying Model-Form Uncertainties in Turbulence Modeling

    CERN Document Server

    Xiao, Heng; Ghanem, Roger G

    2016-01-01

    With the ever-increasing use of Reynolds-Averaged Navier--Stokes (RANS) simulations in mission-critical applications, the quantification of model-form uncertainty in RANS models has attracted attention in the turbulence modeling community. Recently, a physics-based, nonparametric approach for quantifying model-form uncertainty in RANS simulations has been proposed, where Reynolds stresses are projected to physically meaningful dimensions and perturbations are introduced only in the physically realizable limits. However, a challenge associated with this approach is to assess the amount of information introduced in the prior distribution and to avoid imposing unwarranted constraints. In this work we propose a random matrix approach for quantifying model-form uncertainties in RANS simulations with the realizability of the Reynolds stress guaranteed. Furthermore, the maximum entropy principle is used to identify the probability distribution that satisfies the constraints from available information but without int...

  17. Opt In versus Opt Out : A Free-Entry Analysis of Privacy Policies

    NARCIS (Netherlands)

    Bouckaert, J.M.C.; Degryse, H.A.

    2006-01-01

    There is much debate on how the flow of information between firms should be organized, and whether existing privacy laws should be amended.We offer a welfare comparison of the three main current policies towards consumer privacy - anonymity, opt in, and opt out - within a two-period model of

  18. Interactive and Lightweight Mechanisms to Coordinate Interpersonal Privacy in Mediated Communication

    Science.gov (United States)

    Romero, Natalia; Boer, Laurens; Markopoulos, Panos

    In this paper we describe three mechanisms that enable people to coordinate their interaction needs with others in their social network. The proposed designs are based on the Privacy Grounding Model [4] that argues the need for lightweight and interactive coordination mechanisms to support the dynamic and dialectic nature of interpersonal privacy coordination.

  19. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  20. 76 FR 72391 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-11-23

    ...; military hospitalization and medical treatment, immunization, and pharmaceutical dosage records; home and..., immunization, and pharmaceutical dosage records; home and work addresses; and identities of individuals... record is provided in individually identifiable form, and (2) warrants the risk to the privacy of...

  1. Privacy & federated authentication and identity management in the infoservice society

    NARCIS (Netherlands)

    Bodea, G.; Lieshout, M.J. van

    2008-01-01

    The paper examines some of the privacy issues related to forms of federated authentication and identity management (FAIM) employed in the delivery of electronic services (mainly of the government). The paper should be read as a merely exploratory exercise. It starts by defining briefly the context

  2. Privacy & federated authentication and identity management in the infoservice society

    NARCIS (Netherlands)

    Bodea, G.; Lieshout, M.J. van

    2007-01-01

    The paper examines some of the privacy issues related to forms of federated authentication and identity management (FAIM) employed in the delivery of electronic services (mainly of the government). The paper should be read as a merely exploratory exercise. It starts by defining briefly the context

  3. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    OpenAIRE

    Thang Hoang; Deokjai Choi

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a ...

  4. 77 FR 64095 - Privacy Act of 1974, System of Records

    Science.gov (United States)

    2012-10-18

    ... on Agency Telework forms. This would also include electronic business card applications. USAID... include electronic business card applications. Authority for maintenance of the system: Privacy Act of... Crystal Drive, 11th Floor, Arlington, VA 22202. Electronic Comments Federal eRulemaking Portal:...

  5. 17 CFR Appendix A to Subpart A of... - Appendix A to Subpart A of Part 248 Forms

    Science.gov (United States)

    2010-04-01

    ... personal information to market to me.” (4) Nonaffiliate opt-out. If the financial institution shares... not share my personal information with other financial institutions to jointly market to me.” (h... Privacy Form is Used (a) The model form may be used, at the option of a financial institution, including...

  6. Analysis of Different Privacy Preserving Cloud Storage Frameworks

    CERN Document Server

    Bedi, Rajeev; Singh, Tajinder; Singh, Harwinder; Singh, Amritpal

    2012-01-01

    Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It also design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficient framework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloud storage framework in which he designed an interaction protocol among participants, use key derivation algorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide the sensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this framework i...

  7. Hydrological Modeling of the Jezero Crater Outlet-Forming Flood

    Science.gov (United States)

    Fassett, C. I.; Goudge, T. A.

    2017-01-01

    Abundant evidence exists for lakes on Mars both from orbital observations [e.g., 1-3] and in situ exploration [e.g., 4-5]. These lakes can be divided into two classes: those that were hydrologically closed, so their source valley(s) terminated at the basin [3], and those that were hydrologically open, where there was sufficient flow from inlet valley(s) to cause the lake to breach and form an outlet valley [2]. It is easier to be confident from orbital data alone that a standing body of water must have existed in open basins, because there is no other way for their perched outlet valleys to form. The majority of basins fed by valley networks, rather than by isolated inlet valleys, are open [6], with some important exceptions (e.g., Gale Crater). Jezero crater (Fig. 1) is one of the most well-studied open basin paleolakes on Mars, with a breach that re-mains well above the lowest part of the crater floor, and two sedimentary fans at its northwestern margin that are likely deltaic in origin [7-9]. CRISM observations of these sediments indicate they host a variety of alteration minerals [9-11], including smectite and carbonate, and both the mineralogy of the sediments and their settings suggest they have a strong potential for preserving organic materials [10]. As a result, Jezero is a strong candidate landing site for the Mars 2020 rover. Approximate formative discharges have been estimated for its well-preserved western fan (Q approximately 500m3/s) [7], but to our knowledge, no estimates for the dis-charges associated with formation and incision of its outlet valley have been presented. Indeed, only a few studies [e.g., 12-14] have attempted to reconstruct the formation of outlet breaches broadly similar to Jezero anywhere on Mars, despite the apparent commonality of basins with large outlets [e.g., 2]. The outlet valley formed as a dam breach when the lake overflowed. In such an event, the growth and incision of the breach is directly coupled to flood discharge

  8. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  9. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  10. 78 FR 77719 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-24

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is...

  11. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of the retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to...

  12. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records. SUMMARY: Notice is hereby given that the United States Department of Agriculture (USDA) proposes to revise two Privacy Act Systems of...

  13. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  14. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records Appendices AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Revisions of NASA Appendices to Privacy Act System of... publishes with the Agency's systems of records under the Privacy Act of 1974. This notice publishes those...

  15. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  16. Security and Privacy in Video Surveillance: Requirements and Challenges

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2014-01-01

    Use of video surveillance has substantially increased in the last few decades. Modern video surveillance systems are equipped with techniques that allow traversal of data in an effective and efficient manner, giving massive powers to operators and potentially compromising the privacy of anyone...... observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we...... present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our...

  17. Combining forming results via weld models to powerful numerical assemblies

    NARCIS (Netherlands)

    Kose, K.; Rietman, Bert

    2004-01-01

    Forming simulations generally give satisfying results with respect to thinning, stresses, changed material properties and, with a proper springback calculation, the geometric form. The joining of parts by means of welding yields an extra change of the material properties and the residual stresses.

  18. A Plasticity Induced Anisotropic Damage Model for Sheet Forming Processes

    NARCIS (Netherlands)

    Niazi, M.S.; Meinders, V.T.; Wisselink, H.H.; Horn, ten C.H.L.J.; Klaseboer, G.; Boogaard, van den A.H.

    2013-01-01

    Plastic deformation induces damage in Advanced High Strength Steels (AHSS). Therefore damage development in these steels shall be studied and incorporated in the simulations for accurate failure predictions in forming processes and for determination of the product properties after forming. An effici

  19. Combining forming results via weld models to powerful numerical assemblies

    NARCIS (Netherlands)

    Kose, K.; Rietman, B.

    2004-01-01

    Forming simulations generally give satisfying results with respect to thinning, stresses, changed material properties and, with a proper springback calculation, the geometric form. The joining of parts by means of welding yields an extra change of the material properties and the residual stresses. W

  20. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  1. Sheet metal forming optimization by using surrogate modeling techniques

    Science.gov (United States)

    Wang, Hu; Ye, Fan; Chen, Lei; Li, Enying

    2017-01-01

    Surrogate assisted optimization has been widely applied in sheet metal forming design due to its efficiency. Therefore, to improve the efficiency of design and reduce the product development cycle, it is important for scholars and engineers to have some insight into the performance of each surrogate assisted optimization method and make them more flexible practically. For this purpose, the state-of-the-art surrogate assisted optimizations are investigated. Furthermore, in view of the bottleneck and development of the surrogate assisted optimization and sheet metal forming design, some important issues on the surrogate assisted optimization in support of the sheet metal forming design are analyzed and discussed, involving the description of the sheet metal forming design, off-line and online sampling strategies, space mapping algorithm, high dimensional problems, robust design, some challenges and potential feasible methods. Generally, this paper provides insightful observations into the performance and potential development of these methods in sheet metal forming design.

  2. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  3. Fetal privacy and confidentiality.

    Science.gov (United States)

    Botkin, J R

    1995-01-01

    With the advent of new and better contraceptive methods and the ability to facilitate and manipulate fertilization and gestation, couples will gain greater control over their fertility. Once a pregnancy has been established or an in vitro embryo created, the ability to evaluate the embryo and fetus will increase dramatically with progress in human genetic research. Preconception and preimplantation genetic testing and screening are now possible, and the technology to perform prenatal screening early in gestation is advancing rapidly. Nonsurgical methods facilitate induced abortion with a relatively lower degree of trauma upon the woman undergoing the procedure. These capabilities may all be used to enable and even encourage the genetic selection of future children. Despite the ethical concerns associated with prenatal testing and abortion, these services will continue to be an integral aspect of reproductive medicine. As technology advances, however, it will be possible to test and screen for conditions which do not produce serious defects. Genetic conditions which produce relatively mild impacts upon health will be identifiable in the embryo or fetus, while late-onset conditions and genetic factors which have only a probability of affecting health will also be located in the fetal genome. Prospective parents may therefore soon have the capability of selecting their most desirable embryo in vitro, or terminating all undesirable fetuses in vivo until the preferred child is delivered. The medical profession must take some responsibility for establishing guidelines on the use of reproductive technology. The standards of practice for the medical profession must reflect the results of a broad social debate over competing moral values. The author develops an argument for legal and ethical limitations on the application of prenatal testing and screening technology, suggesting that for some medical conditions, respect for the privacy and confidentiality of the fetus

  4. On genomics, kin, and privacy.

    Science.gov (United States)

    Telenti, Amalio; Ayday, Erman; Hubaux, Jean Pierre

    2014-01-01

    The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. Access to genome data may result from a personal decision to disclose, or from gaps in protection. In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. Increasing availability of genome data linked or linkable to metadata through online social networks and services adds one additional layer of complexity to the protection of genome privacy.  The field of computer science and information technology offers solutions to secure genomic data so that individuals, medical personnel or researchers can access only the subset of genomic information required for healthcare or dedicated studies.

  5. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  6. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  7. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  8. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  9. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, W.

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM sys

  10. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains

    Directory of Open Access Journals (Sweden)

    Xunjun Chen

    2015-06-01

    Full Text Available One of the major applications of Radio Frequency Identification (RFID technology is in supply chain management as it promises to provide real-time visibility based on the function of track and trace. However, such an RFID-based track and trace system raises new security and privacy challenges due to the restricted resource of tags. In this paper, we refine three privacy related models (i.e., the privacy, path unlinkability, and tag unlinkability of RFID-based track and trace systems, and clarify the relations among these privacy models. Specifically, we have proven that privacy is equivalent to path unlinkability and tag unlinkability implies privacy. Our results simplify the privacy concept and protocol design for RFID-based track and trace systems. Furthermore, we propose an efficient track and trace scheme, Tracker+, which allows for authentic and private identification of RFID-tagged objects in supply chains. In the Tracker+, no computational ability is required for tags, but only a few bytes of storage (such as EPC Class 1 Gen 2 tags are needed to store the tag state. Indeed, Tracker+ reduces the memory requirements for each tag by one group element compared to the Tracker presented in other literature. Moreover, Tracker+ provides privacy against supply chain inside attacks.

  11. An Efficient Context-Aware Privacy Preserving Approach for Smartphones

    Directory of Open Access Journals (Sweden)

    Lichen Zhang

    2017-01-01

    Full Text Available With the proliferation of smartphones and the usage of the smartphone apps, privacy preservation has become an important issue. The existing privacy preservation approaches for smartphones usually have less efficiency due to the absent consideration of the active defense policies and temporal correlations between contexts related to users. In this paper, through modeling the temporal correlations among contexts, we formalize the privacy preservation problem to an optimization problem and prove its correctness and the optimality through theoretical analysis. To further speed up the running time, we transform the original optimization problem to an approximate optimal problem, a linear programming problem. By resolving the linear programming problem, an efficient context-aware privacy preserving algorithm (CAPP is designed, which adopts active defense policy and decides how to release the current context of a user to maximize the level of quality of service (QoS of context-aware apps with privacy preservation. The conducted extensive simulations on real dataset demonstrate the improved performance of CAPP over other traditional approaches.

  12. Protecting location privacy for outsourced spatial data in cloud storage.

    Science.gov (United States)

    Tian, Feng; Gui, Xiaolin; An, Jian; Yang, Pan; Zhao, Jianqiang; Zhang, Xuejun

    2014-01-01

    As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC(∗)) and a density-based space filling curve (DSC) to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.

  13. Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Feng Tian

    2014-01-01

    Full Text Available As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC∗ and a density-based space filling curve (DSC to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC∗ and DSC are more secure than SHC, and DSC achieves the best index generation performance.

  14. Evaluation of ductile failure models in Sheet Metal Forming

    Directory of Open Access Journals (Sweden)

    Amaral Rui

    2016-01-01

    Full Text Available Traditionally, combination of equivalent plastic strain and stress triaxiality parameters are taken into account when performing characterization of material ductility. Some well-established models like Lemaitre model, GTN based models and many others perform relatively well at high-triaxiality stress states but fail to give adequate answers to low-triaxiality states. In this work, three damage models are presented, applied and assessed to a cross-shaped component. Concerning material, AA5182-O, corresponding damage parameters are characterized by an inverse analysis procedure for each damage model.

  15. Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters

    Directory of Open Access Journals (Sweden)

    Ling Guo

    2009-12-01

    Full Text Available Randomized Response techniques have been investigated in privacy preserving categorical data analysis. However, the released distortion parameters can be exploited by attackers to breach privacy. In this paper, we investigate whether data mining or statistical analysis tasks can still be conducted on randomized data when distortion parameters are not disclosed to data miners. We first examine how various objective association measures between two variables may be affected by randomization. We then extend to multiple variables by examining the feasibility of hierarchical loglinear modeling. Finally we show some classic data mining tasks that cannot be applied on the randomized data directly.

  16. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....... intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...

  17. Multi-scale friction modeling for sheet metal forming

    NARCIS (Netherlands)

    Hol, Johan

    2013-01-01

    Finite element (FE) formability analyses are everyday practice in the metal-forming industry to reduce costs and lead time of new metal products. Although the predictive capabilities of FE software codes have improved significantly over the years, unfortunately, the experimental trial-and-error proc

  18. Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices

    CERN Document Server

    Kaosar, Md Golam

    2010-01-01

    In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD). Privacy preserved exchange of counts of itemsets among distributed mining sites is a vital part in association rule mining process. Existing cryptography based privacy preserving solutions consume lot of computation due to complex mathematical equations involved. Therefore less computation involved privacy solutions are extremely necessary to deploy mining applications in RCD. In this algorithm, a semi-trusted mixer is used to unify the counts of itemsets encrypted by all mining sites without revealing individual values. The proposed algorithm is built on with a well known communication efficient association rule mining algorithm named count distribution (CD). Security proofs along with performance analysis and comparison show the well acceptability and effectiveness of the proposed algorithm. Efficient and straightforward privacy model and satisfactory perf...

  19. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    Science.gov (United States)

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects.

  20. Intimacy, Confidentiality, and Power: Kiss and Tell as a Feminist Critique of Privacy Law

    Directory of Open Access Journals (Sweden)

    Naomh Gibson

    2015-12-01

    Full Text Available The current principle of privacy and its enactment in law and policy is presented as a reified, universal value that is gender-neutral. However this article contends this presumption, and advances that privacy is an inconsistent area of law that has allowed for the oppression of women’s rights and interests. It will be proposed that the narrative of ‘kiss and tell’ stories offers access to substantive justice and equality by subverting legal and gender norms and deconstructing the concept of privacy. Using the tools of feminist legal theory and theoretical commentary, this argument forms four sections. Firstly, it will be introduced that privacy is a value which is nebulous at best, and the reasons for critiquing privacy law using a perspective from feminist legal theory will be explored. Following this, the injustices perpetrated against women by the current state of privacy law will be outlined – particularly in the area of sexual information and sexuality. Using examples from both the UK and American jurisdictions, it will be submitted that privacy law is mired in patriarchal values. Thirdly, the jurisprudence underpinning privacy law decisions on sexual relationships and the legal concepts of confidence and intimacy will be critically examined and deconstructed. Finally, drawing upon investigative research, anecdotal evidence, and critical analysis, it will be submitted that ‘kiss and tell’ narratives are the way forward to reconceptualise privacy. It will be recommended that kiss and tell stories have value in social communication and present a chance for women to engage in relevant public discourse, and more widely, gives law an opportunity to reach a new understanding of privacy appropriate in the modern age.

  1. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of...

  2. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing pri

  3. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  4. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  5. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    Science.gov (United States)

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  6. Comparisons of friction models in bulk metal forming

    DEFF Research Database (Denmark)

    Tan, Xincai

    2002-01-01

    A friction model is one of the key input boundary conditions in finite element simulations. It is said that the friction model plays an important role in controlling the accuracy of necessary output results predicted. Among the various friction models, which one is of higher accuracy is still...... unknown and controversial. In this paper, finite element analyses applying five different friction models to experiments of upsetting of AA 6082 lubricated with four lubricants are presented. Frictional parameter values are determined by fitness of data of friction area ratio from finite element analysis...... to experimental results. It is found that calibration curves of the friction area ratio for all of the five chosen friction models used in the finite element simulation do fit the experimental results. Usually, calbration curves of the friction area ratio are more sensitive to friction at the tool...

  7. Calibrated and Interactive Modelling of Form-Active Hybrid Structures

    DEFF Research Database (Denmark)

    Quinn, Gregory; Holden Deleuran, Anders; Piker, Daniel

    2016-01-01

    Form-active hybrid structures (FAHS) couple two or more different structural elements of low self weight and low or negligible bending flexural stiffness (such as slender beams, cables and membranes) into one structural assembly of high global stiffness. They offer high load-bearing capacity...... materially-informed sketching. Making use of a projection-based dynamic relaxation solver for structural analysis, explorative design has proven to be highly effective....

  8. Rare disease research: Breaking the privacy barrier.

    Science.gov (United States)

    Mascalzoni, Deborah; Paradiso, Angelo; Hansson, Matts

    2014-06-01

    Due to the few patients affected, rare disease research has to count on international registries to exist in order to produce significant research outputs. Data sharing of registries is therefore a unique resource to allow rare disease research to flourish and any lost data will jeopardize the quality of an already extremely difficult research. The rules usually applied to research such as the right to withdraw or the need for specific consent for every use of data can be detrimental in order to get effective results. Privacy rights regulated through traditional informed consent mechanisms have been regarded as a major barrier in order to effectively share data worldwide. Some authors argue that this barrier hampers results that could be beneficial to the patients so that another right will be overstated: the right to quality healthcare. We argue in this paper that privacy has been often interpreted just one-sided as the right to secrecy but it can entail another meaning: the right to manage one's own private sphere. Managing it pertains, not only to the right to deny access, but also to the right to grant access. At the same time research on patient participation and transparency shows that new forms of IT-based informed consent can provide a good balance between the right of individuals to be in control of their data and the opportunity for science to pursue international research.

  9. Rare disease research: Breaking the privacy barrier

    Directory of Open Access Journals (Sweden)

    Deborah Mascalzoni

    2014-06-01

    Full Text Available Due to the few patients affected, rare disease research has to count on international registries to exist in order to produce significant research outputs. Data sharing of registries is therefore a unique resource to allow rare disease research to flourish and any lost data will jeopardize the quality of an already extremely difficult research. The rules usually applied to research such as the right to withdraw or the need for specific consent for every use of data can be detrimental in order to get effective results. Privacy rights regulated through traditional informed consent mechanisms have been regarded as a major barrier in order to effectively share data worldwide. Some authors argue that this barrier hampers results that could be beneficial to the patients so that another right will be overstated: the right to quality healthcare. We argue in this paper that privacy has been often interpreted just one-sided as the right to secrecy but it can entail another meaning: the right to manage one's own private sphere. Managing it pertains, not only to the right to deny access, but also to the right to grant access. At the same time research on patient participation and transparency shows that new forms of IT-based informed consent can provide a good balance between the right of individuals to be in control of their data and the opportunity for science to pursue international research.

  10. 77 FR 51949 - Privacy Act, Exempt Record System

    Science.gov (United States)

    2012-08-28

    ... of Criminal Investigations, HHS Office of Inspector General, the Department of Justice, or other... of civil or criminal law. FDA's new system of records will be modeled after the system of records... rule. Under the Privacy Act (5 U.S.C. 552a), individuals have a right of access to...

  11. Facilitating Trust in Privacy-Preserving E-Learning Environments

    Science.gov (United States)

    Anwar, M.; Greer, J.

    2012-01-01

    This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…

  12. 76 FR 44888 - Privacy Act of 1974, System of Records

    Science.gov (United States)

    2011-07-27

    ...'') cloud computing model. The suite is composed of Gmail for e-mail, Google Docs for office productivity... Information Security Officer--Chief Privacy Officer. USAID-30 System name: Google Apps Business Edition. Security classification: Sensitive But Unclassified. System location(s): United States Agency...

  13. Facilitating Trust in Privacy-Preserving E-Learning Environments

    Science.gov (United States)

    Anwar, M.; Greer, J.

    2012-01-01

    This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…

  14. Privacy Risk Assessment Case Studies in Support of SQUARE

    Science.gov (United States)

    2009-07-01

    much‖ [ Feinman 2000]. This model uses Hand‘s cost-benefit analysis [Hand 1947], which con- siders three factors for use in managing privacy: 1. the...4 (May 2009): 215–228. [ Feinman 2000] Feinman , J. M. Law 101. Oxford, England: Oxford University Press, 2000. [Hand 1947] United States v

  15. Investigating privacy attitudes and behavior in relation to personalization

    NARCIS (Netherlands)

    Garde-Perik, E. van de; Markopoulos, P.; Ruyter, B.E.R. de; Eggen, B.; IJsselsteijn, W.A.

    2008-01-01

    This article presents an experimental study of privacy-related attitudes and behaviors regarding a music recommender service based on two types of user modeling: personality traits and musical preferences. Contrary to prior expectations and attitudes reported by participants, personality traits are

  16. Dissolution models for glassy waste forms; Modeles de dissolution des formes de dechets a base de verre

    Energy Technology Data Exchange (ETDEWEB)

    Harvey, K.B.

    1995-06-01

    As a part of the Canadian Nuclear Fuel Waste Management Program (CNFWMP), a suite of models has been developed that describe the dissolution of a glass under a variety of conditions. This work had two aims: to develop and present the models in such a way that the equations associated with models could be used to unambiguously extract the fundamental dissolution constants of a glass from experimental data, and to demonstrate the correspondence between models and experiments over a sufficiently broad range of conditions such that the models could be used with confidence to forecast performance under conditions that might not be realistically accessible to experiments.

  17. Friction Modelling In Connection With Cold Forming Processes

    DEFF Research Database (Denmark)

    Tan, Xincai

    soap or molybdenum disulphide. As processes testing friction sensitive flow, the ring-compression tests and the double cup extrusion tests are carried out. An absolute constant friction model has been proposed to separate the influence of strain hardening from friction. This model has been applied...... in the FEM analyses of the process tests. In the simulative testing, the compression-twist tests in open die and closed die are carried out to measure friction stress directly at varying normal pressure, surface expansion, sliding length and tool temperature etc. It is found that normal pressure...... differences in the results. New empirical friction models have therefore been developed, based on the results of the simulative tests. Applying these models in the FEM simulations shows that they are acceptable for direct applications. In direct process testing, the forward rod extrusion test is investigated...

  18. Comparison of GTN Damage Models for Sheet Metal Forming

    Institute of Scientific and Technical Information of China (English)

    CHEN Zhi-ying; DONG Xiang-huai

    2008-01-01

    The Gurson-Tvergaard-Needleman (GTN) damage model was developed basing on anisotropic yield criterion to predict the damage evolution for anisotropic voided ductile materials.Hill's quadratic anisotropic yield criterion (1948) and Barlat's 3-component anisotropic yield criterion (1989) were used to describe the anisotropy of the matrix.User defined subroutines were developed using the above models.Taking the benchmark of NUMISHEET'93 square cup deep drawing as an example,the effect of matrix plastic anisotropy on a ductile material was studied.The predicted result by Barlat'89-GTN model has a better agreement with the experimental data than that by Hill'48-GTN and the original GTN model.

  19. Indoor Air Quality Building Education and Assessment Model Forms

    Science.gov (United States)

    The Indoor Air Quality Building Education and Assessment Model (I-BEAM) is a guidance tool designed for use by building professionals and others interested in indoor air quality in commercial buildings.

  20. A Magnetic Ribbon Model for Star-Forming Filaments

    CERN Document Server

    Auddy, Sayantan; Kudoh, Takahiro

    2016-01-01

    We develop a magnetic ribbon model for molecular cloud filaments. These result from turbulent compression in a molecular cloud in which the background magnetic field sets a preferred direction. We argue that this is a natural model for filaments and is based on the interplay between turbulence, strong magnetic fields, and gravitationally-driven ambipolar diffusion, rather than pure gravity and thermal pressure. An analytic model for the formation of magnetic ribbons that is based on numerical simulations is used to derive a lateral width of a magnetic ribbon. This differs from the thickness along the magnetic field direction, which is essentially the Jeans scale. We use our model to calculate a synthetic observed relation between apparent width in projection versus observed column density. The relationship is relatively flat, similar to observations, and unlike the simple expectation based on a Jeans length argument.

  1. A Magnetic Ribbon Model for Star-forming Filaments

    Science.gov (United States)

    Auddy, Sayantan; Basu, Shantanu; Kudoh, Takahiro

    2016-11-01

    We develop a magnetic ribbon model for molecular cloud filaments. These result from turbulent compression in a molecular cloud in which the background magnetic field sets a preferred direction. We argue that this is a natural model for filaments and is based on the interplay between turbulence, strong magnetic fields, and gravitationally driven ambipolar diffusion, rather than pure gravity and thermal pressure. An analytic model for the formation of magnetic ribbons that is based on numerical simulations is used to derive a lateral width of a magnetic ribbon. This differs from the thickness along the magnetic field direction, which is essentially the Jeans scale. We use our model to calculate a synthetic observed relation between apparent width in projection versus observed column density. The relationship is relatively flat, similar to observations, and unlike the simple expectation based on a Jeans length argument.

  2. A Photochemical Kinetic Model for Solid Dosage Forms.

    Science.gov (United States)

    Carvalho, Thiago C; La Cruz, Thomas E; Tabora, Jose E

    2017-08-20

    Photochemical kinetics models for pharmaceutical compounds in solution have been extensively investigated, but not in solid phase upon exposure to different light sources. The objective of this study was to develop a mathematical model to describe the solid state photodegradation of pharmaceutical powder materials under different area/volumetric scales and light exposure conditions. The model considered the previous formalism presented for photodegradation kinetics in solution phase with important elements applied to static powder material being irradiated with a polychromatic light source. The model also included the influence of optical phenomena (i.e. reflectance, scattering factors, etc.) by applying Beer-Lambert law to light attenuation, including effects of powder density. Drug substance and drug product intermediates (blends and tablet cores) were exposed to different light sources and intensities. The model reasonably predicted the photodegradation levels of powder beds of drug substance and drug product intermediates under white and yellow lights with intensities around 5 to 11 kLux. Importantly, the model estimates demonstrated that the reciprocity law for photoreactions was held. Further model evaluation showed that, due to light attenuation, the powder bed is in virtual darkness at cake depths greater than 500 μm. At 100 μm, the photodegradation of the investigated compound is expected to be close to 100% in 10 days under white fluorescent halophosphate light at 9.5 kLux. For tablets, defining the volume over exposed surface area ratio is more challenging. Nevertheless, the model can consider a bracket between worst and best cases to provide a reasonable photodegradation estimate. This tool can be significantly leveraged to simulate different light exposure scenarios while assessing photostability risk in order to define appropriate Control Strategy in manufacturing. Copyright © 2017. Published by Elsevier B.V.

  3. NLOS UV Channel Modeling Using Numerical Integration and an Approximate Closed-Form Path Loss Model

    CERN Document Server

    Gupta, Ankit; Brandt-Pearce, Maïté

    2012-01-01

    In this paper we propose a simulation method using numerical integration, and develop a closed-form link loss model for physical layer channel characterization for non-line of sight (NLOS) ultraviolet (UV) communication systems. The impulse response of the channel is calculated by assuming both uniform and Gaussian profiles for transmitted beams and different geometries. The results are compared with previously published results. The accuracy of the integration approach is compared to the Monte Carlo simulation. Then the path loss using the simulation method and the suggested closed-form expression are presented for different link geometries. The accuracies are evaluated and compared to the results obtained using other methods.

  4. Governance Through Privacy, Fairness, and Respect for Individuals.

    Science.gov (United States)

    Baker, Dixie B; Kaye, Jane; Terry, Sharon F

    2016-01-01

    Individuals have a moral claim to be involved in the governance of their personal data. Individuals' rights include privacy, autonomy, and the ability to choose for themselves how they want to manage risk, consistent with their own personal values and life situations. The Fair Information Practices principles (FIPPs) offer a framework for governance. Privacy-enhancing technology that complies with applicable law and FIPPs offers a dynamic governance tool for enabling the fair and open use of individual's personal data. Any governance model must protect against the risks posed by data misuse. Individual perceptions of risks are a subjective function involving individuals' values toward self, family, and society, their perceptions of trust, and their cognitive decision-making skills. Individual privacy protections and individuals' right to choose are codified in the HIPAA Privacy Rule, which attempts to strike a balance between the dual goals of information flow and privacy protection. The choices most commonly given individuals regarding the use of their health information are binary ("yes" or "no") and immutable. Recent federal recommendations and law recognize the need for granular, dynamic choices. Individuals expect that they will govern the use of their own health and genomic data. Failure to build and maintain individuals' trust increases the likelihood that they will refuse to grant permission to access or use their data. The "no surprises principle" asserts that an individual's personal information should never be collected, used, transmitted, or disclosed in a way that would surprise the individual were she to learn about it. The FIPPs provide a powerful framework for enabling data sharing and use, while maintaining trust. We introduce the eight FIPPs adopted by the Department of Health and Human Services, and provide examples of their interpretation and implementation. Privacy risk and health risk can be reduced by giving consumers control, autonomy, and

  5. Modelling the chemical evolution of star forming filaments

    Science.gov (United States)

    Seifried, D.; Walch, S.

    2016-05-01

    We present simulations of star forming filaments incorporating - to our knowledge - the largest chemical network used to date on-the-fly in a 3D-MHD simulation. The network contains 37 chemical species and about 300 selected reaction rates. For this we use the newly developed package KROME (Grassi et al. [4]). Our results demonstrate the feasibility of using such a complex chemical network in 3D-MHD simulations on modern supercomputers. We perform simulations with different strengths of the interstellar radiation field and the cosmic ray ionisation rate and find chemical and physical results in accordance with observations and other recent numerical work.

  6. Modelling the chemical evolution of star forming filaments

    CERN Document Server

    Seifried, D

    2015-01-01

    We present simulations of star forming filaments incorporating - to our knowledge - the largest chemical network used to date on-the-fly in a 3D-MHD simulation. The network contains 37 chemical species and about 300 selected reaction rates. For this we use the newly developed package KROME (Grassi et al. 2014). Our results demonstrate the feasibility of using such a complex chemical network in 3D-MHD simulations on modern supercomputers. We perform simulations with different strengths of the interstellar radiation field and the cosmic ray ionisation rate and find chemical and physical results in accordance with observations and other recent numerical work.

  7. 基于序贯博弈模型分析技术保护电子商务中的网络隐私%Analysis of Network Privacy Protection Technology in the Electronic Commerce Market Based on the Game Theory Model

    Institute of Scientific and Technical Information of China (English)

    顾炜江

    2014-01-01

    To keep down the particular situation of loss of privacy that e-commerce network leaked out the user network privacy, this article modeled the game behavior of e-commerce consumer and businesses;and with the introduction of online protection technology into the sequential game framework. We discussed the online protection technology of privacy in the utilization of e-commerce market-oriented. This conclusion found that this online privacy protection technology restricting the ability of e-commerce businesses to recognize the heterogeneity of online consumer, can indeed play a role to protect consumer privacy through reducing the resale income of the consumer privacy information, and under certain conditions, it can also promote the expansion of the scale of the e-commerce market.%为遏制电子商务网络转卖用户网络信息的泄露隐私行为,本文将消费者和电子商务企业之间的博弈行为模型化,在序贯博弈模型的框架上加入了网络隐私保护技术,并探索在电子商务市场化中的运用。结果发现,这种限制电子商务企业辨识“异质性”消费者的网络隐私保护技术,通过降低消费者隐私信息转卖收入进而可以起到保护消费者隐私的作用,在一定条件下也可以促进电子商务市场规模的扩大。

  8. Modeling fluxes and form in landslide-prone terrain

    Science.gov (United States)

    Roering, J. J.; Booth, A. M.; Stock, J. D.

    2011-12-01

    Landslides dramatically alter the Earth's surface over short timescales. The mass transfer associated with a limited number of slope failures can dominate the sediment budget of a region for decades or longer. The initiation, failure geometry, and runout of individual landslides depend on a range of factors and cannot be predicted from current models. Given these realities of landslide behavior over human timescales, it is challenging to reasonably represent these processes in landscape evolution models. Here, we evaluate the ability of two landslide models, both of which are formulated to apply at geomorphic timescales, to generate topographic patterns and sediment flux rates observed in natural landscapes. Episodic debris flow activity is ubiquitous in steep, low-order mountainous catchments and generates valley networks with low concavity. A physically-based model for debris flow incision (Stock and Dietrich, GSA Bull, 2006) proposes that incision rates depend on the frequency, volume, and velocity of debris flows as well as the density of trigger sites and the state of bedrock weathering in low-order valleys. Valley slope angles are predicted to decline with drainage area according to how these properties vary spatially. We calibrated the model for a well-studied small catchment in the Oregon Coast Range using cosmogenic radionuclide erosion rates and then analyzed the slope-area signature of low-order valleys across much of the Central Oregon Coast Range to explore spatial variations in baselevel lowering. This endeavor shows that baselevel lowering rates vary significantly due to patches of resistant bedrock, drainage reorganization, and tectonic forcing. In regions with weak sedimentary bedrock, earthflows can reduce hillslope gradients, promote gullying, and dominate sediment yield through their downslope translation. A one-dimensional, physically-based model for earthflow-prone hillslope evolution (Booth and Roering, JGR, in press) incorporates earthflow

  9. Nation-wide primary healthcare research network: a privacy protection assessment.

    Science.gov (United States)

    De Clercq, Etienne; Van Casteren, Viviane; Bossuyt, Nathalie; Moreels, Sarah; Goderis, Geert; Bartholomeeusen, Stefaan; Bonte, Pierre; Bangels, Marc

    2012-01-01

    Efficiency and privacy protection are essential when setting up nationwide research networks. This paper investigates the extent to which basic services developed to support the provision of care can be re-used, whilst preserving an acceptable privacy protection level, within a large Belgian primary care research network. The generic sustainable confidentiality management model used to assess the privacy protection level of the selected network architecture is described. A short analysis of the current architecture is provided. Our generic model could also be used in other countries.

  10. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    Science.gov (United States)

    Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A

    2017-01-01

    The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  11. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  12. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  13. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  14. SPM: Source Privacy for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ren Jian

    2010-01-01

    Full Text Available Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (MANETs due to node mobility and lack of physical protection. Existing cryptosystem-based techniques and broadcasting-based techniques cannot be easily adapted to MANET because of their extensive cryptographic computation and/or large communication overhead. In this paper, we first propose a novel unconditionally secure source anonymous message authentication scheme (SAMAS. This scheme enables message sender to transmit messages without relying on any trusted third parties. While providing source privacy, the proposed scheme can also provide message content authenticity. We then propose a novel communication protocol for MANET that can ensure communication privacy for both message sender and message recipient. This protocol can also protect end-to-end routing privacy. Our security analysis demonstrates that the proposed protocol is secure against various attacks. The theoretical analysis and simulation show that the proposed scheme is efficient and can provide high message delivery ratio. The proposed protocol can be used for critical infrastructure protection and secure file sharing in mobile ad hoc networks where dynamic groups can be formed.

  15. ANALYSIS OF DIFFERENT PRIVACY PRESERVING CLOUD STORAGE FRAMEWORKS

    Directory of Open Access Journals (Sweden)

    Rajeev Bedi

    2012-01-01

    Full Text Available Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologiesare used to preserve data security in cloud storage. [1] Proposes a framework which includes the designof data organization structure, the generation and management of keys, the treatment of change of user’saccess right and dynamic operations of data, and the interaction between participants. It also design aninteractive protocol and an extirpation-based key derivation algorithm, which are combined with lazyrevocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficientframework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloudstorage framework in which he designed an interaction protocol among participants, use key derivationalgorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide thesensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this frameworkis realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks,running overhead of the system and the privacy security of the frameworks.

  16. Privacy Preserving Content Protection (Privacy behoud content protection)

    OpenAIRE

    Deng, Mina

    2010-01-01

    De vooruitgang van informatie- en communicatietechnologie in de laatste decennia heeft de manier waarop informatie wordt verzameld en verwerkt grondig beїnvloed. Dit roept echter ook vraagtekens op rond de manier waarop met privacy wordt omgegaan. De komst van digitale technologieën, het gemak waarmee ongeoorloofde kopieën kunnen worden geproduceerd, en de toegang tot digitale inhoud -- leidend tot commerciële inbreuken -- motiveren de nood om content protection (inhoudsbeschermende) te...

  17. Practical Privacy in WDM Networks with All-Optical Layered Encryption

    OpenAIRE

    Engelmann, Anna; Jukan, Admela

    2016-01-01

    Privacy in form of anonymous communication could be comparably both faster and harder to break in optical routers than in today's anonymous IP networks based on The Onion Routing (Tor). Implementing the practical privacy alloptically,however, is not straightforward, as it requires key generation in each anonymization node to avoid distribution of long keys, and layered encryption, both at the optical line rate. Due to the unavailability of cryptographically strong optical key generation and e...

  18. Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems

    Science.gov (United States)

    Parra-Arnau, Javier; Rebollo-Monedero, David; Forné, Jordi

    2014-03-01

    Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent functionality, but at the same time, it is the source of serious privacy concerns. In this paper we investigate a privacy-enhancing technology that aims at hindering an attacker in its efforts to accurately profile users based on the items they rate. Our approach capitalizes on the combination of two perturbative mechanisms---the forgery and the suppression of ratings. While this technique enhances user privacy to a certain extent, it inevitably comes at the cost of a loss in data utility, namely a degradation of the recommendation's accuracy. In short, it poses a trade-off between privacy and utility. The theoretical analysis of said trade-off is the object of this work. We measure privacy as the Kullback-Leibler divergence between the user's and the population's item distributions, and quantify utility as the proportion of ratings users consent to forge and eliminate. Equipped with these quantitative measures, we find a closed-form solution to the problem of optimal forgery and suppression of ratings, and characterize the trade-off among privacy, forgery rate and suppression rate. Experimental results on a popular recommendation system show how our approach may contribute to privacy enhancement.

  19. Security and Privacy Issues in Ehealthcare Systems: Towards Trusted Services

    Directory of Open Access Journals (Sweden)

    Isra’a Ahmed Zriqat

    2016-09-01

    Full Text Available Recent years have witnessed a widespread availability of electronic healthcare data record (EHR systems. Vast amounts of health data were generated in the process of treatment in medical centers such hospitals, clinics, or other institutions. To improve the quality of healthcare service, EHRs could be potentially shared by a variety of users. This results in significant privacy issues that should be addressed to make the use of EHR practical. In fact, despite the recent research in designing standards and regulations directives concerning security and privacy in EHR systems, it is still, however, not completely settled out the privacy challenges. In this paper, a systematic literature review was conducted concerning the privacy issues in electronic healthcare systems. More than 50 original articles were selected to study the existing security approaches and figure out the used security models. Also, a novel Context-aware Access Control Security Model (CARE is proposed to capture the scenario of data interoperability and support the security fundamentals of healthcare systems along with the capability of providing fine-grained access control.

  20. Process modelling and die design concepts for forming aircraft sheet parts

    Science.gov (United States)

    Hatipoğlu, H. A.; Alkaş, C. O.

    2016-08-01

    This study is about typical sheet metal forming processes applied in aerospace industry including flexform, stretch form and stretch draw. Each process is modelled by using finite element method for optimization. Tensile, bulge, forming limit and friction tests of commonly used materials are conducted for defining the hardening curves, yield loci, anisotropic constants, forming limit curves and friction coefficients between die and sheet. Process specific loadings and boundary conditions are applied to each model. The models are then validated by smartly designed experiments that characterize the related forming processes. Lastly, several examples are given in which those models are used to predict the forming defects before physical forming and necessary die design and process parameter changes are applied accordingly for successful forming operations.

  1. A Model for the Colour Form Factor of the Proton

    CERN Document Server

    Dischler, J

    2000-01-01

    The total cross-section and the jet cross-section differ at a proton-proton collision. The latter is divergent if arbitrarily small transverse momenta are allowed. Even with some fixed lower pt cutoff, increases the jet cross-section much faster than the total cross-section at high energies. We have in this paper studied how the divergence could be tamed by colour screening effects among the partons. To do this we have built a proton model where we assign momenta, positions and colour-charge to all partons in the proton. We find that the relative behaviour of the cross-section can be better understood by the inclusion of this effect.

  2. Privacy im Social Semantic Web

    Science.gov (United States)

    Nagenborg, Michael

    Der Schwerpunkt dieses Beitrages liegt auf dem Design von Infrastrukturen, welche es ermöglichen sollen, private Daten kontrolliert preiszugeben und auszutauschen. Zunächst wird daran erinnert, dass rechtliche und technische Maßnahmen zum Datenschutz stets auch dazu dienen, den Austausch von Daten zu ermöglichen. Die grundlegende Herausforderung besteht darin, der sozialen und politischen Bedeutung des Privaten Rechnung zu tragen. Privatheit wird aus der Perspektive der Informationsethik dabei als ein normatives, handlungsleitendes Konzept verstanden. Als Maßstab für die Gestaltung der entsprechenden Infrastrukturen wird auf Helen Nissenbaums Konzept der privacy as contextual integrity" zurückgegriffen, um u. a. die Ansätze der end-to-end information accountability" [38] und des Privacy Identity Management for Europe"- Projektes zu diskutieren.

  3. Genetic privacy: orthodoxy or oxymoron?

    Science.gov (United States)

    Sommerville, A; English, V

    1999-01-01

    In this paper we question whether the concept of "genetic privacy" is a contradiction in terms. And, if so, whether the implications of such a conclusion, inevitably impact on how society comes to perceive privacy and responsibility generally. Current law and ethical discourse place a high value on self-determination and the rights of individuals. In the medical sphere, the recognition of patient "rights" has resulted in health professionals being given clear duties of candour and frankness. Dilemmas arise, however, when patients decline to know relevant information or, knowing it, refuse to share it with others who may also need to know. This paper considers the notions of interconnectedness and responsibility to others which are brought to the fore in the genetic sphere and which challenge the primacy afforded to personal autonomy. It also explores the extent to which an individual's perceived moral obligations can or should be enforced. PMID:10226920

  4. A unified spray forming model for the prediction of billet shape geometry

    DEFF Research Database (Denmark)

    Hattel, Jesper; Pryds, Nini

    2004-01-01

    In the present work a unified model for simulating the spray forming process has been developed. Models for the atomization and the deposition processes have been coupled together in order to obtain a new unified description of the spray forming process. The model is able to predict the shape and...

  5. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... these two. Based on a study of corporate social responsibility disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a corporate social responsibility. The findings indicate that only a small proportion...... of approaches to addressing privacy was found, which suggests that no institutionalization of privacy practices has taken place yet. The study therefore indicates that online privacy is rather new on the corporate social responsibility agenda, currently playing only a minor role....

  6. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  7. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  8. Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications

    OpenAIRE

    Jedrzejczyk, Lukasz; Price, Blaine; Bandara, Arosha; Nuseibeh, Bashar

    2010-01-01

    peer-reviewed We describe the ???Privacy-Shake???, a novel interface for managing coarse grained privacy settings. We built a prototype that enables users of Buddy Tracker, an example location sharing application, to change their privacy preferences by shaking their phone. Users can enable or disable location sharing and change the level of granularity of disclosed location by shaking and sweeping their phone. In this poster we present and motivate our work on Privacy-Shake and report on a...

  9. Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services

    OpenAIRE

    Deuker, André

    2010-01-01

    International audience; When interacting with applications, users are less restrictive in disclosing their personal data than if asked in an application-independent context. On a more general level this behavior is termed as privacy paradox. The creation of privacy awareness can assist users in dealing with context-aware services without harming their privacy unintentionally, thereby addressing the privacy paradox. The paper in hand provides a research approach towards the integration of priv...

  10. "I am Spartacus":Privacy Enhancing Technologies, Collaborative Obfuscation and Privacy as a Public Good

    OpenAIRE

    Kwecka, Z.; Buchanan, W.; Schafer, B; Rauhofer, J.

    2014-01-01

    The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This idea finds its correspondence in our approach to privacy protection through obfuscation, where everybody in a group takes a small privacy risk to protect the anonymity of fellow group members. We show how these ideas can be computationally realised in an Investigative Data Acquisition Platform (IDAP). IDAP is an efficient symmetric Private Informat...

  11. Multi-objectives fuzzy optimization model for ship form demonstration based on information entropy

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Selecting optimization ship form scheme is an important content in the process of concept design of ship. Multi-objective fuzzy decision-making model for ship form demonstration is set up according to the fuzzy pattern-recognition theory. Weight coefficients of each target of ship form scheme are determined by information entropy and individual subjective partiality. This model is used to select the optimal ship form scheme,the example shows that the model is exact and the result is credible. It can provide a reference for choosing the optimization scheme of ship form.

  12. Lithospheric Architecture, Heterogenities, Instabilities, Melting - insight form numerical modelling

    Science.gov (United States)

    Gorczyk, Weronika; Hobbs, Bruce; Ord, Alison; Gessner, Klaus; Gerya, Taras V.

    2010-05-01

    The seismological structure of the Earth's lithosphere is identified to be strongly heterogeneous in terms of thermal and rheological structures. Lithospheric discontinuities (sharp changes in the thermal and/or compositional structure) are thought to be long lived and are mostly correlated with major tectonic boundaries that commonly have been reactivated and which subsequently are the foci of magma intrusion and major mineralization. Resent studies have shown that mantle metasomatism is also controlled by such boundaries. This paper explores the control that lithospheric heterogeneity exerts on the thermal and chemical evolution during deformation subsequent to the development of the heterogeneity. We explore the behaviour of the rheological heterogeneous lithosphere in a compressional regime. The occurrence of such variations may be caused for instance by amalgamation of micro-continents such as is thought to be characteristic of the Yilgarn, Western Australia or South Africa. Theses micro-continents, due to diverse histories may be characterised by various thermal and rheological structures. The models are simplistic but illustrate the basic principles. The code used in this study is based on a conservative finite-difference, multi-grid, marker in cell method. Devolatilisation reactions and melting can affect the physical properties of rocks and are incorporated in a self-consistent manner. We use a petrological-thermomechanical modelling approach with all rock properties including mechanical properties calculated in the Lagrangian scheme for rock markers at every time step based on Gibbs free energy minimization as a function of the local pressure, temperature and rock composition. The results illustrate that initial structural complexity is necessary for and has a dramatic effect on fault and development, the growth of deep basins, core complex formation, melting and devolatilisation within the lithosphere. The horizontal and vertical variation in plastic

  13. Privacy Preserving Moving KNN Queries

    CERN Document Server

    Hashem, Tanzima; Zhang, Rui

    2011-01-01

    We present a novel approach that protects trajectory privacy of users who access location-based services through a moving k nearest neighbor (MkNN) query. An MkNN query continuously returns the k nearest data objects for a moving user (query point). Simply updating a user's imprecise location such as a region instead of the exact position to a location-based service provider (LSP) cannot ensure privacy of the user for an MkNN query: continuous disclosure of regions enables the LSP to follow a user's trajectory. We identify the problem of trajectory privacy that arises from the overlap of consecutive regions while requesting an MkNN query and provide the first solution to this problem. Our approach allows a user to specify the confidence level that represents a bound of how much more the user may need to travel than the actual kth nearest data object. By hiding a user's required confidence level and the required number of nearest data objects from an LSP, we develop a technique to prevent the LSP from tracking...

  14. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  15. Phase equilibria in model surfactants forming Langmuir monolayers.

    Science.gov (United States)

    Ramírez, E; Santana, A; Cruz, A; López, G E

    2007-12-14

    The study of Langmuir monolayers has generated the attention of researchers because of their unique properties and their not well understood phase equilibrium. These monolayers exhibit interesting phase diagrams where the unusual liquid-liquid equilibrium can be observed for a single component monolayer. Monte Carlo computer simulations in the virtual Gibbs ensemble were used to obtain the phase diagram of Langmuir monolayers. The liquid-vapor and liquid-liquid phase equilibria were considered by constructing the Cailletet-Mathias phase diagrams. By using the Ising model and the rectilinear approximations the identification of the critical properties for both equilibria was determined. These critical parameters were calculated as a function of the strength of the interaction between the surfactant molecules and the aqueous subphase. As a result, we have identified the coexistence between a liquid expanded state (LES)-vapor and the liquid condensed state-LES, in agreement with experimental and theoretical evidence in the literature. We obtained a clear separation of phases and a strong dependence on the strength of the solvent used. Namely, as the interaction between the solvent and the head of the surfactant increases, the critical properties also increase. Equilibrium states were characterized by computing thermodynamic quantities as a function of temperature and solvent strength.

  16. Trust and Privacy in Our Networked World

    OpenAIRE

    Tavani, Herman T.; Dieter Arnold

    2011-01-01

    Remarking on the relationship between the concepts of trust and privacy, Charles Fried (1990, p. 56) [1] writes: Trust is the attitude of expectation that another will behave according to the constraints of morality… There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right… Without privacy and the...

  17. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  18. Predicting Privacy Attitudes Using Phone Metadata

    OpenAIRE

    2016-01-01

    With the increasing usage of smartphones, there is a corresponding increase in the phone metadata generated by individuals using these devices. Managing the privacy of personal information on these devices can be a complex task. Recent research has suggested the use of social and behavioral data for automatically recommending privacy settings. This paper is the first effort to connect users' phone use metadata with their privacy attitudes. Based on a 10-week long field study involving phone m...

  19. 77 FR 59386 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-09-27

    ...] Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of a Revised Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial [[Page 59387

  20. COUPLED ATOMIZATION AND SPRAY MODELLING IN THE SPRAY FORMING PROCESS USING OPENFOAM

    DEFF Research Database (Denmark)

    Gjesing, Rasmus; Hattel, Jesper Henri; Fritsching, Udo

    2009-01-01

    The paper presents a numerical model capable of simulating the atomization, break-up and in-flight spray phenomena in the spray forming process. The model is developed and implemented in the freeware code openFOAM. The focus is on studying the coupling effect of the melt break-up phenomena...... model for droplet cooling and solidification. The model is tested and validated against results from literature and experiments. Subsequently, the model is used to simulate the complex flow fields in the spray forming process and the results are discussed. The presented model of the spray forming...

  1. 77 FR 65206 - Privacy Act of 1974; Amendment of Privacy Act System of Records

    Science.gov (United States)

    2012-10-25

    ... BOARD Privacy Act of 1974; Amendment of Privacy Act System of Records AGENCY: Merit Systems Protection... maintains subject to the Privacy Act of 1974 (5 U.S.C. 552a). MSPB/ GOVT-1, ``Appeals and Case Records,'' is being amended to reflect that its location is in the Office of the Clerk of the Board. Also, the...

  2. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  3. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  4. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  5. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  6. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  7. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies

    CERN Document Server

    Mascetti, Sergio; Bettini, Claudio; Wang, X Sean; Jajodia, Sushil

    2010-01-01

    A major feature of the emerging geo-social networks is the ability to notify a user when one of his friends (also called buddies) happens to be geographically in proximity with the user. This proximity service is usually offered by the network itself or by a third party service provider (SP) using location data acquired from the users. This paper provides a rigorous theoretical and experimental analysis of the existing solutions for the location privacy problem in proximity services. This is a serious problem for users who do not trust the SP to handle their location data, and would only like to release their location information in a generalized form to participating buddies. The paper presents two new protocols providing complete privacy with respect to the SP, and controllable privacy with respect to the buddies. The analytical and experimental analysis of the protocols takes into account privacy, service precision, and computation and communication costs, showing the superiority of the new protocols compa...

  8. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  9. A framework for privacy and security analysis of probe-based traffic information systems

    KAUST Repository

    Canepa, Edward S.

    2013-01-01

    Most large scale traffic information systems rely on fixed sensors (e.g. loop detectors, cameras) and user generated data, this latter in the form of GPS traces sent by smartphones or GPS devices onboard vehicles. While this type of data is relatively inexpensive to gather, it can pose multiple security and privacy risks, even if the location tracks are anonymous. In particular, creating bogus location tracks and sending them to the system is relatively easy. This bogus data could perturb traffic flow estimates, and disrupt the transportation system whenever these estimates are used for actuation. In this article, we propose a new framework for solving a variety of privacy and cybersecurity problems arising in transportation systems. The state of traffic is modeled by the Lighthill-Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. The resulting framework is very flexible, and can in particular be used to detect spoofing attacks in real time, or carry out attacks on location tracks. Numerical implementations are performed on experimental data from the Mobile Century experiment to validate this framework. © 2013 ACM.

  10. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2011-05-01

    Full Text Available In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP videoconferencing software used between patients and therapists to provide telerehabilitation (TR therapy.  In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010, encryption (p=0.006, and security evaluation (p=0.005. Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR.  Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.Keywords: Voice over the Internet Protocol (VOIP, telerehabilitation, HIPAA, privacy, security, evaluation

  11. Who commits virtual identity suicide? Differences in privacy concerns, Internet addiction, and personality between Facebook users and quitters.

    Science.gov (United States)

    Stieger, Stefan; Burger, Christoph; Bohn, Manuel; Voracek, Martin

    2013-09-01

    Social networking sites such as Facebook attract millions of users by offering highly interactive social communications. Recently, a counter movement of users has formed, deciding to leave social networks by quitting their accounts (i.e., virtual identity suicide). To investigate whether Facebook quitters (n=310) differ from Facebook users (n=321), we examined privacy concerns, Internet addiction scores, and personality. We found Facebook quitters to be significantly more cautious about their privacy, having higher Internet addiction scores, and being more conscientious than Facebook users. The main self-stated reason for committing virtual identity suicide was privacy concerns (48 percent). Although the adequacy of privacy in online communication has been questioned, privacy is still an important issue in online social communications.

  12. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    Science.gov (United States)

    Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S.

    2017-01-01

    Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today’s culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies), editing (cropping and filtering), and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties) was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women (n = 2,509, 66.7%). The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult) by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting) among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers. PMID:28588530

  13. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    Science.gov (United States)

    Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S

    2017-01-01

    Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today's culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies), editing (cropping and filtering), and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties) was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women (n = 2,509, 66.7%). The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult) by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting) among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers.

  14. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    Directory of Open Access Journals (Sweden)

    Amandeep Dhir

    2017-05-01

    Full Text Available Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today’s culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies, editing (cropping and filtering, and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women (n = 2,509, 66.7%. The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers.

  15. 12 CFR Appendix C to Part 334 - Model Forms for Opt-Out Notices

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model Forms for Opt-Out Notices C Appendix C to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Pt. 334, App. C Appendix C to Part 334—Model Forms for Opt-Out Notices...

  16. Form factors of the monodromy matrix entries in gl(2|1)-invariant integrable models

    CERN Document Server

    Hutsalyuk, A; Pakuliak, S Z; Ragoucy, E; Slavnov, N A

    2016-01-01

    We study integrable models solvable by the nested algebraic Bethe ansatz and described by $\\mathfrak{gl}(2|1)$ or $\\mathfrak{gl}(1|2)$ superalgebras. We obtain explicit determinant representations for form factors of the monodromy matrix entries. We show that all form factors are related to each other at special limits of the Bethe parameters. Our results allow one to obtain determinant formulas for form factors of local operators in the supersymmetric t-J model.

  17. Form factors of the monodromy matrix entries in gl (2 | 1)-invariant integrable models

    Science.gov (United States)

    Hutsalyuk, A.; Liashyk, A.; Pakuliak, S. Z.; Ragoucy, E.; Slavnov, N. A.

    2016-10-01

    We study integrable models solvable by the nested algebraic Bethe ansatz and described by gl (2 | 1) or gl (1 | 2) superalgebras. We obtain explicit determinant representations for form factors of the monodromy matrix entries. We show that all form factors are related to each other at special limits of the Bethe parameters. Our results allow one to obtain determinant formulas for form factors of local operators in the supersymmetric t- J model.

  18. A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing

    OpenAIRE

    Ahmed, Faraz; Jin, Rong; Liu, Alex X.

    2013-01-01

    Online social networks are being increasingly used for analyzing various societal phenomena such as epidemiology, information dissemination, marketing and sentiment flow. Popular analysis techniques such as clustering and influential node analysis, require the computation of eigenvectors of the real graph's adjacency matrix. Recent de-anonymization attacks on Netflix and AOL datasets show that an open access to such graphs pose privacy threats. Among the various privacy preserving models, Dif...

  19. Privacy Protection in Participatory Sensing Applications Requiring Fine-Grained Locations

    DEFF Research Database (Denmark)

    Dong, Kai; Gu, Tao; Tao, Xianping

    2010-01-01

    The emerging participatory sensing applications have brought a privacy risk where users expose their location information. Most of the existing solutions preserve location privacy by generalizing a precise user location to a coarse-grained location, and hence they cannot be applied in those...... provider is an trustworthy entity, making our solution more feasible to practical applications. We present and analyze our security model, and evaluate the performance and scalability of our system....

  20. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99- 18.... These statements are intended to inform the public of government- wide policies and how each...

  1. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with

  2. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  3. Contemporary Privacy Theory Contributions to Learning Analytics

    Science.gov (United States)

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  4. Just in Time Research: Privacy Practices

    Science.gov (United States)

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  5. Online privacy: overview and preliminary research

    Directory of Open Access Journals (Sweden)

    Renata Mekovec

    2010-12-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 

  6. Privacy and Ethics in Undergraduate GIS Curricula

    Science.gov (United States)

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  7. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with pr

  8. A Deontological View of the Privacy Debate.

    Science.gov (United States)

    Wilson, Alan

    The mass media are at odds with the public on issues concerning privacy, i.e., issues concerning whether private information about a person should be printed in a newspaper or magazine. In a 1982 survey, one journalist/respondent said his or her newspaper "almost always" favored the public's right to know over a person's right to privacy.…

  9. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  10. The Press, Privacy, and Community Mores.

    Science.gov (United States)

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  11. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user...

  12. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the $<, =, >$ re

  13. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  14. Protecting privacy in data release

    CERN Document Server

    Livraga, Giovanni

    2015-01-01

    This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsou

  15. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  16. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  17. Axial form factors of the octet baryons in a covariant quark model

    CERN Document Server

    Ramalho, G

    2015-01-01

    We study the weak interaction axial form factors of the octet baryons, within the covariant spectator quark model, focusing on the dependence of four-momentum transfer squared, Q^2. In our model the axial form factors G_A(Q^2) (axial-vector form factor) and G_P(Q^2) (induced pseudoscalar form factor), are calculated based on the constituent quark axial form factors and the octet baryon wave functions. The quark axial current is parametrized by the two constituent quark form factors, the axial-vector form factor g_A^q(Q^2), and the induced pseudoscalar form factor g_P^q(Q^2). The baryon wave functions are composed of a dominant S-state and a P-state mixture for the relative angular momentum of the quarks. First, we study in detail the nucleon case. We assume that the quark axial-vector form factor g_A^q(Q^2) has the same function form as that of the quark electromagnetic isovector form factor. The remaining parameters of the model, the P-state mixture and the Q^2-dependence of g_P^q(Q^2), are determined by a f...

  18. Skyrme-Model $\\pi NN$ Form Factor and Nucleon-Nucleon Interaction

    CERN Document Server

    Holzwarth, G

    1997-01-01

    We apply the strong $\\pi NN$ form factor, which emerges from the Skyrme model, in the two-nucleon system using a one-boson-exchange (OBE) model for the nucleon-nucleon (NN) interaction. Deuteron properties and phase parameters of NN scattering are reproduced well. In contrast to the form factor of monopole shape that is traditionally used in OBE models, the Skyrme form factor leaves low momentum transfers essentially unaffected while it suppresses the high-momentum region strongly. It turns out that this behavior is very appropriate for models of the NN interaction and makes possible to use a soft pion form factor in the NN system. As a consequence, the $\\pi N$ and the $NN$ systems can be described using the same soft $\\pi NN$ form factor, which is impossible with the monopole.

  19. Cloud-assisted mobile-access of health data with privacy and auditability.

    Science.gov (United States)

    Tong, Yue; Sun, Jinyuan; Chow, Sherman S M; Li, Pan

    2014-03-01

    Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and auditability for misusing health data. Specifically, we propose to integrate key management from pseudorandom number generator for unlinkability, a secure indexing method for privacy-preserving keyword search which hides both search and access patterns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with auditability to prevent potential misbehavior, in both normal and emergency cases.

  20. On the Semantics of Purpose Requirements in Privacy Policies

    CERN Document Server

    Tschantz, Michael Carl; Wing, Jeannette M

    2011-01-01

    Privacy policies often place requirements on the purposes for which a governed entity may use personal information. For example, regulations, such as HIPAA, require that hospital employees use medical information for only certain purposes, such as treatment. Thus, using formal or automated methods for enforcing privacy policies requires a semantics of purpose requirements to determine whether an action is for a purpose or not. We provide such a semantics using a formalism based on planning. We model planning using a modified version of Markov Decision Processes, which exclude redundant actions for a formal definition of redundant. We use the model to formalize when a sequence of actions is only for or not for a purpose. This semantics enables us to provide an algorithm for automating auditing, and to describe formally and compare rigorously previous enforcement methods.

  1. Adaptively Sharing Time-Series with Differential Privacy

    CERN Document Server

    Fan, Liyue

    2012-01-01

    Sharing real-time aggregate statistics of private data has given much benefit to the public to perform data mining for understanding important phenomena, such as Influenza outbreaks and traffic congestions. We propose an adaptive approach with sampling and estimation to release aggregated time series under differential privacy, the key innovation of which is that we utilize feedback loops based on observed (perturbed) values to dynamically adjust the estimation model as well as the sampling rate. To minimize the overall privacy cost, our solution uses the PID controller to adaptively sample long time-series according to detected data dynamics. To improve the accuracy of data release per timestamp, the Kalman filter is used to predict data values at non-sampling points and to estimate true values from perturbed query answers at sampling points. Our experiments with three real data sets show that it is beneficial to incorporate feedback into both the estimation model and the sampling process. The results confir...

  2. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    Science.gov (United States)

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  3. A new micro scale FE model of crystalline materials in micro forming process

    Directory of Open Access Journals (Sweden)

    Luo Liang

    2016-01-01

    Full Text Available Micro forming of metals has drawn global attention due to the increasing requirement of micro metal products. However, the size effects become significant in micro forming processes and affect the application of finite element (FE simulation of micro forming processes. Dividing samples into small areas according to their microstructures and assigning individual properties to each small area are a possible access to micro forming simulation considering material size effects. In this study, a new model that includes both grains and their boundaries was developed based on the observed microstructures of samples. The divided subareas in the model have exact shapes and sizes with real crystals on the sample, and each grain and grain boundaries have their own properties. Moreover, two modelling methods using different information from the microstructural images were introduced in detail. The two modelling methods largely increase the availability of various microstructural images. The new model provides accurate results which present the size effects well.

  4. On form factors of the conjugated field in the non-linear Schroedinger model

    Energy Technology Data Exchange (ETDEWEB)

    Kozlowski, K.K.

    2011-05-15

    Izergin-Korepin's lattice discretization of the non-linear Schroedinger model along with Oota's inverse problem provides one with determinant representations for the form factors of the lattice discretized conjugated field operator. We prove that these form factors converge, in the zero lattice spacing limit, to those of the conjugated field operator in the continuous model. We also compute the large-volume asymptotic behavior of such form factors in the continuous model. These are in particular characterized by Fredholm determinants of operators acting on closed contours. We provide a way of defining these Fredholm determinants in the case of generic paramaters. (orig.)

  5. On form factors of the conjugated field in the non-linear Schroedinger model

    Energy Technology Data Exchange (ETDEWEB)

    Kozlowski, K.K.

    2011-05-15

    Izergin-Korepin's lattice discretization of the non-linear Schroedinger model along with Oota's inverse problem provides one with determinant representations for the form factors of the lattice discretized conjugated field operator. We prove that these form factors converge, in the zero lattice spacing limit, to those of the conjugated field operator in the continuous model. We also compute the large-volume asymptotic behavior of such form factors in the continuous model. These are in particular characterized by Fredholm determinants of operators acting on closed contours. We provide a way of defining these Fredholm determinants in the case of generic paramaters. (orig.)

  6. Axial form factor of the nucleon in the perturbative chiral quark model

    CERN Document Server

    Khosonthongkee, K; Faessler, Amand; Gutsche, T; Lyubovitskij, V E; Pumsa-ard, K; Yan, Y

    2004-01-01

    We apply the perturbative chiral quark model (PCQM) at one loop to analyze the axial form factor of the nucleon. This chiral quark model is based on an effective Lagrangian, where baryons are described by relativistic valence quarks and a perturbative cloud of Goldstone bosons as dictated by chiral symmetry. We apply the formalism to obtain analytical expressions for the axial form factor of the nucleon, which is given in terms of fundamental parameters of low-energy pion-nucleon physics (weak pion decay constant, strong pion-nucleon form factor) and of only one model parameter (radius of the nucleonic three-quark core).

  7. A collaborative framework for Distributed Privacy-Preserving Support Vector Machine learning.

    Science.gov (United States)

    Que, Jialan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    A Support Vector Machine (SVM) is a popular tool for decision support. The traditional way to build an SVM model is to estimate parameters based on a centralized repository of data. However, in the field of biomedicine, patient data are sometimes stored in local repositories or institutions where they were collected, and may not be easily shared due to privacy concerns. This creates a substantial barrier for researchers to effectively learn from the distributed data using machine learning tools like SVMs. To overcome this difficulty and promote efficient information exchange without sharing sensitive raw data, we developed a Distributed Privacy Preserving Support Vector Machine (DPP-SVM). The DPP-SVM enables privacy-preserving collaborative learning, in which a trusted server integrates "privacy-insensitive" intermediary results. The globally learned model is guaranteed to be exactly the same as learned from combined data. We also provide a free web-service (http://privacy.ucsd.edu:8080/ppsvm/) for multiple participants to collaborate and complete the SVM-learning task in an efficient and privacy-preserving manner.

  8. Control of interior surface materials for speech privacy in high-speed train cabins.

    Science.gov (United States)

    Jang, H S; Lim, H; Jeon, J Y

    2017-05-01

    The effect of interior materials with various absorption coefficients on speech privacy was investigated in a 1:10 scale model of one high-speed train cabin geometry. The speech transmission index (STI) and privacy distance (rP ) were measured in the train cabin to quantify speech privacy. Measurement cases were selected for the ceiling, sidewall, and front and back walls and were classified as high-, medium- and low-absorption coefficient cases. Interior materials with high absorption coefficients yielded a low rP , and the ceiling had the largest impact on both the STI and rP among the interior elements. Combinations of the three cases were measured, and the maximum reduction in rP by the absorptive surfaces was 2.4 m, which exceeds the space between two rows of chairs in the high-speed train. Additionally, the contribution of the interior elements to speech privacy was analyzed using recorded impulse responses and a multiple regression model for rP using the equivalent absorption area. The analysis confirmed that the ceiling was the most important interior element for improving speech privacy. These results can be used to find the relative decrease in rP in the acoustic design of interior materials to improve speech privacy in train cabins. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  9. 32 CFR 806b.4 - Privacy Act complaints.

    Science.gov (United States)

    2010-07-01

    ... unique system complaints through the respective component chain of command. (b) For Privacy Act... complaints or allegations of Privacy Act violations through the appropriate base or Major Command Privacy Act office, to the local systems manager. The base or Major Command Privacy Act officer directs the...

  10. 45 CFR 503.2 - General policies-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  11. 45 CFR 503.1 - Definitions-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  12. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Science.gov (United States)

    2010-05-19

    ... SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be held on June 10, 2010, from 8...

  13. 43 CFR 2.47 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to all...

  14. Privacy Issues of a National Research and Education Network.

    Science.gov (United States)

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  15. 25 CFR 700.259 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  16. Digital Privacy: Toward a New Politics and Discursive Practice.

    Science.gov (United States)

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  17. 差分隐私保护研究综述%Survey of research on differential privacy

    Institute of Scientific and Technical Information of China (English)

    李杨; 温雯; 谢光强

    2012-01-01

    差分隐私保护通过添加噪声使数据失真,从而起到保护隐私的目的,对于一个严格定义下的攻击模型,其具有添加噪声少、隐私泄露风险低的优点.介绍了差分隐私保护的理论基础和最新研究进展,详细阐述了分类、聚类等差分隐私学习方法的最新研究情况,介绍了一个差分隐私保护的应用框架PINQ( privacy integrated queries),并对未来的研究发展方向进行了展望.%Differential privacy approach makes data distortion to preserve privacy by means of adding noise. To a rigorous defined attacking model, differential privacy ensures that adding little amount of noise have a low risk of privacy disclosure. This paper surveyed the definition of differential privacy, showed the newest results in research, introduced algorithms of classify, clustering on differentially private learning, and presented a differential privacy application framework PINQ( privacy integrated queries). Finally, this paper discussed directions for future research.

  18. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely futur

  19. Electromagnetic form factors of the baryon octet in the perturbative chiral quark model

    CERN Document Server

    Cheedket, S; Gutsche, T; Faessler, A; Pumsa-ard, K; Yan, Y; Gutsche, Th.; Faessler, Amand

    2002-01-01

    We apply the perturbative chiral quark model at one loop to analyze the electromagnetic form factors of the baryon octet. The analytic expressions for baryon form factors, which are given in terms of fundamental parameters of low-energy pion-nucleon physics(weak pion decay constant, axial nucleon coupling, strong pion-nucleon form factor), and the numerical results for baryon magnetic moments, charge and magnetic radii are presented. Our results are in good agreement with experimental data.

  20. Privacy by design in personal health monitoring.

    Science.gov (United States)

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  1. New threats to health data privacy.

    Science.gov (United States)

    Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y

    2011-11-24

    Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  2. Kids Sell: Celebrity Kids’ Right to Privacy

    Directory of Open Access Journals (Sweden)

    Seong Choul Hong

    2016-04-01

    Full Text Available The lives of celebrities are often spotlighted in the media because of their newsworthiness; however, many celebrities argue that their right to privacy is often infringed upon. Concerns about celebrity privacy are not limited to the celebrities themselves and often expand to their children. As a result of their popularity, public interest has pushed paparazzi and journalists to pursue trivial and private details about the lives of both celebrities and their children. This paper investigates conflicting areas where the right to privacy and the right to know collide when dealing with the children of celebrities. In general, the courts have been unsympathetic to celebrity privacy claims, noting their newsworthiness and self-promoted characteristic. Unless the press violates news-gathering ethics or torts, the courts will often rule in favor of the media. However, the story becomes quite different when related to an infringement on the privacy of celebrities’ children. This paper argues that all children have a right to protect their privacy regardless of their parents’ social status. Children of celebrities should not be exempt to principles of privacy just because their parents are a celebrity. Furthermore, they should not be exposed by the media without the voluntary consent of their legal patrons. That is, the right of the media to publish and the newsworthiness of children of celebrities must be restrictedly acknowledged.

  3. Incorporating Prior Knowledge for Quantifying and Reducing Model-Form Uncertainty in RANS Simulations

    CERN Document Server

    Wang, Jian-Xun; Xiao, Heng

    2015-01-01

    Simulations based on Reynolds-Averaged Navier--Stokes (RANS) models have been used to support high-consequence decisions related to turbulent flows. Apart from the deterministic model predictions, the decision makers are often equally concerned about the predictions confidence. Among the uncertainties in RANS simulations, the model-form uncertainty is an important or even a dominant source. Therefore, quantifying and reducing the model-form uncertainties in RANS simulations are of critical importance to make risk-informed decisions. Researchers in statistics communities have made efforts on this issue by considering numerical models as black boxes. However, this physics-neutral approach is not a most efficient use of data, and is not practical for most engineering problems. Recently, we proposed an open-box, Bayesian framework for quantifying and reducing model-form uncertainties in RANS simulations by incorporating observation data and physics-prior knowledge. It can incorporate the information from the vast...

  4. Using Canonical Forms for Isomorphism Reduction in Graph-based Model Checking

    NARCIS (Netherlands)

    Kant, Gijs

    2010-01-01

    Graph isomorphism checking can be used in graph-based model checking to achieve symmetry reduction. Instead of one-to-one comparing the graph representations of states, canonical forms of state graphs can be computed. These canonical forms can be used to store and compare states. However, computing

  5. Measuring the achievable error of query sets under differential privacy

    CERN Document Server

    Li, Chao

    2012-01-01

    A common goal of privacy research is to release synthetic data that satisfies a formal privacy guarantee and can be used by an analyst in place of the original data. To achieve reasonable accuracy, a synthetic data set must be tuned to support a specified set of queries accurately, sacrificing fidelity for other queries. This work considers methods for producing synthetic data under differential privacy and investigates what makes a set of queries "easy" or "hard" to answer. We consider answering sets of linear counting queries using the matrix mechanism, a recent differentially-private mechanism that can reduce error by adding complex correlated noise adapted to a specified workload. Our main result is a novel lower bound on the minimum total error required to simultaneously release answers to a set of workload queries. The bound reveals that the hardness of a query workload is related to the spectral properties of the workload when it is represented in matrix form. The bound is tight and, because it satisfi...

  6. A Form Factor Model for Exclusive B- and D-Decays

    CERN Document Server

    Stech, B

    1996-01-01

    An explicit model is presented which gives the momentum transfer-dependent ratios of form factors of hadronic currents. For the unknown Isgur-Wise function and its generalization for transitions to light particles a simple phenomenological Ansatz is added. The model allows a calculation of all form factors in terms of mass parameters only. It is tested by comparison with experimental data, QCD sum rules and lattice calculations.

  7. Relativistic quark-diquark model of baryons. Non strange spectrum and nucleon electromagnetic form factors

    CERN Document Server

    De Sanctis, M; Santopinto, E; Vassallo, A

    2015-01-01

    We briefly describe our relativistic quark-diquark model, developed within the framework of point form dynamics, which is the relativistic extension of the interacting quark-diquark model. In order to do that we have to show the main properties and quantum numbers of the effective degree of freedom of constituent diquark. Our results for the nonstrange baryon spectrum and for the nucleon electromagnetic form factors are discussed.

  8. Probabilistic conditional reasoning: Disentangling form and content with the dual-source model.

    Science.gov (United States)

    Singmann, Henrik; Klauer, Karl Christoph; Beller, Sieghard

    2016-08-01

    The present research examines descriptive models of probabilistic conditional reasoning, that is of reasoning from uncertain conditionals with contents about which reasoners have rich background knowledge. According to our dual-source model, two types of information shape such reasoning: knowledge-based information elicited by the contents of the material and content-independent information derived from the form of inferences. Two experiments implemented manipulations that selectively influenced the model parameters for the knowledge-based information, the relative weight given to form-based versus knowledge-based information, and the parameters for the form-based information, validating the psychological interpretation of these parameters. We apply the model to classical suppression effects dissecting them into effects on background knowledge and effects on form-based processes (Exp. 3) and we use it to reanalyse previous studies manipulating reasoning instructions. In a model-comparison exercise, based on data of seven studies, the dual-source model outperformed three Bayesian competitor models. Overall, our results support the view that people make use of background knowledge in line with current Bayesian models, but they also suggest that the form of the conditional argument, irrespective of its content, plays a substantive, yet smaller, role.

  9. Integrated assessment of acid deposition impacts using reduced-form modeling. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Sinha, R.; Small, M.J.

    1996-05-01

    Emissions of sulfates and other acidic pollutants from anthropogenic sources result in the deposition of these acidic pollutants on the earth`s surface, downwind of the source. These pollutants reach surface waters, including streams and lakes, and acidify them, resulting in a change in the chemical composition of the surface water. Sometimes the water chemistry is sufficiently altered so that the lake can no longer support aquatic life. This document traces the efforts by many researchers to understand and quantify the effect of acid deposition on the water chemistry of populations of lakes, in particular the improvements to the MAGIC (Model of Acidification of Groundwater in Catchments) modeling effort, and describes its reduced-form representation in a decision and uncertainty analysis tool. Previous reduced-form approximations to the MAGIC model are discussed in detail, and their drawbacks are highlighted. An improved reduced-form model for acid neutralizing capacity is presented, which incorporates long-term depletion of the watershed acid neutralization fraction. In addition, improved fish biota models are incorporated in the integrated assessment model, which includes reduced-form models for other physical and chemical processes of acid deposition, as well as the resulting socio-economic and health related effects. The new reduced-form lake chemistry and fish biota models are applied to the Adirondacks region of New York.

  10. An Integrated Approach for the Numerical Modelling of the Spray Forming Process

    DEFF Research Database (Denmark)

    Hattel, Jesper; Thorborg, Jesper; Pryds, Nini

    2003-01-01

    In this paper, an integrated approach for modelling the entire spray forming process is presented. The basis for the analysis is a recently developed model which extents previous studies and includes the interaction between an array of droplets and the enveloping gas. The formulation of the depos......In this paper, an integrated approach for modelling the entire spray forming process is presented. The basis for the analysis is a recently developed model which extents previous studies and includes the interaction between an array of droplets and the enveloping gas. The formulation...

  11. Effects of Interactive Function Forms in a Self-Organized Critical Model Based on Neural Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAOXiao-Wei; ZHOULi-Ming; CHENTian-Lun

    2003-01-01

    Based on the standard self-organizing map neural network model and an integrate-and-fire mechanism, we introduce a kind of coupled map lattice system to investigate scale-invariance behavior in the activity of model neural populations. We let the parameter β, which together with α represents the interactive strength between neurons, have different function forms, and we find the function forms and their parameters are very important to our model''s avalanche dynamical behaviors, especially to the emergence of different avalanche behaviors in different areas of our system.

  12. Partially Compensatory Multidimensional Item Response Theory Models: Two Alternate Model Forms

    Science.gov (United States)

    DeMars, Christine E.

    2016-01-01

    Partially compensatory models may capture the cognitive skills needed to answer test items more realistically than compensatory models, but estimating the model parameters may be a challenge. Data were simulated to follow two different partially compensatory models, a model with an interaction term and a product model. The model parameters were…

  13. 5G Visions of User Privacy

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    2015-01-01

    Currently, the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed...... for the future 5G networks. The paper concludes that an ecosystem consisting of Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future systems...

  14. Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols

    Directory of Open Access Journals (Sweden)

    Qingwen Guo

    2017-05-01

    Full Text Available Privacy-preserving optimistic fair exchange (P2OFE is a kind of protocols which aim to solve the fairness problem in the exchange of digital signatures between two parties and in the meanwhile protect their privacy. In P2OFE, no one else including the semi-trusted third party in charge of arbitration can confirm an exchange even after resolving a dispute. In this paper we present a black-box construction of P2OFE based on a tag-based public key encryption scheme and a standard digital signature scheme. Our construction follows the ‘sign-then-encrypt’ paradigm, and is secure in the standard model. Our construction is generic and admits more instantiations of P2OFE.

  15. Free-form geometric modeling by integrating parametric and implicit PDEs.

    Science.gov (United States)

    Du, Haixia; Qin, Hong

    2007-01-01

    Parametric PDE techniques, which use partial differential equations (PDEs) defined over a 2D or 3D parametric domain to model graphical objects and processes, can unify geometric attributes and functional constraints of the models. PDEs can also model implicit shapes defined by level sets of scalar intensity fields. In this paper, we present an approach that integrates parametric and implicit trivariate PDEs to define geometric solid models containing both geometric information and intensity distribution subject to flexible boundary conditions. The integrated formulation of second-order or fourth-order elliptic PDEs permits designers to manipulate PDE objects of complex geometry and/or arbitrary topology through direct sculpting and free-form modeling. We developed a PDE-based geometric modeling system for shape design and manipulation of PDE objects. The integration of implicit PDEs with parametric geometry offers more general and arbitrary shape blending and free-form modeling for objects with intensity attributes than pure geometric models.

  16. Privacy and Intercultural Communication——Causes Behind Different Privacy of the Chinese and the American

    Institute of Scientific and Technical Information of China (English)

    侯彩虹; 潘建虎

    2012-01-01

    Chinese culture is featured by its “togethemess”,collectivism,and its agricultural tradition;while American culture is featured by its “apartness”,individualism and its industrial tradition.The three dominant features determine the two cultures' different privacy rules.This paper puts the focus on the analysis of the causes behind the two different privacy.What's more,the globalization influences the privacy rules of the two cultures,people are more adaptive and have changed a lot.

  17. A Privacy-Preserving Distributed Optimal Scheduling for Interconnected Microgrids

    Directory of Open Access Journals (Sweden)

    Nian Liu

    2016-12-01

    Full Text Available With the development of microgrids (MGs, interconnected operation of multiple MGs is becoming a promising strategy for the smart grid. In this paper, a privacy-preserving distributed optimal scheduling method is proposed for the interconnected microgrids (IMG with a battery energy storage system (BESS and renewable energy resources (RESs. The optimal scheduling problem is modeled to minimize the coalitional operation cost of the IMG, including the fuel cost of conventional distributed generators and the life loss cost of BESSs. By using the framework of the alternating direction method of multipliers (ADMM, a distributed optimal scheduling model and an iteration solution algorithm for the IMG is introduced; only the expected exchanging power (EEP of each MG is required during the iterations. Furthermore, a privacy-preserving strategy for the sharing of the EEP among MGs is designed to work with the mechanism of the distributed algorithm. According to the security analysis, the EEP can be delivered in a cooperative and privacy-preserving way. A case study and numerical results are given in terms of the convergence of the algorithm, the comparison of the costs and the implementation efficiency.

  18. Generalized vector form factors of the pion in a chiral quark model

    CERN Document Server

    Broniowski, Wojciech

    2008-01-01

    Generalized vector form factors of the pion, related to the moments of the generalized parton distribution functions, are evaluated in the Nambu--Jona-Lasinio model with the Pauli-Villars regularization. The lowest moments (the electromagnetic and the gravitational form factors) are compared to recent lattice data, with fair agreement. Predictions for higher-order moments are also made. Relevant features of the generalized form factors in the chiral quark models are highlighted and the role of the QCD evolution for the higher-order GFFs is stressed.

  19. Application of a shear-modified GTN model to incremental sheet forming

    Science.gov (United States)

    Smith, Jacob; Malhotra, Rajiv; Liu, W. K.; Cao, Jian

    2013-12-01

    This paper investigates the effects of using a shear-modified Gurson-Tvergaard-Needleman model, which is based on the mechanics of voids, for simulating material behavior in the incremental forming process. The problem chosen for analysis is a simplified version of the NUMISHEET 2014 incremental forming benchmark test. The implications of the shear-modification of the model specifically for incremental sheet forming processes are confirmed using finite element analysis. It is shown that including the shear term has a significant effect on fracture timing in incremental forming, which is not well reflected in the observed tensile test simulations for calibration. The numerical implementation and the need for comprehensive calibration of the model are briefly discussed.

  20. Closed-form impulse response model of non-line-of-sight single-scatter propagation.

    Science.gov (United States)

    Sun, Yu; Zhan, Yafeng

    2016-04-01

    For optical scattering communication, a closed-form expression of channel impulse response (CIR) is favorable for further system design and channel capacity analysis. Combining the mean value theorem of integrals and L'Hôpital's rule, the exact non-line-of-sight (NLOS) single-scatter propagation model is simplified to a closed-form CIR model for a laser source with a narrow beam. Based on this model, by joint geometrical and empirical approaches, a piecewise CIR expression is presented under certain system NLOS geometries. Through numerical results on CIR for various NLOS geometries, the proposed model is verified with the exact NLOS single-scatter propagation model and the previous Gamma fitting model, showing that our model agrees better with the former than the latter.

  1. Understanding how patients form beliefs about pharmacists' trustworthiness using a model of belief processing.

    Science.gov (United States)

    West, Donna S; Wilkin, Noel E; Bentley, John P; Gilbert, Faye; Garner, Dewey D

    2002-01-01

    To determine what information people use in forming beliefs about pharmacists' trustworthiness and to determine whether these pieces of information can be categorized using elements of a model of belief processing. Participants in two focus groups were asked about the trustworthiness of pharmacists in one dispensing scenario and two pharmaceutical care scenarios. Transcripts were analyzed, and each piece of information provided was coded as an evidence statement or a claim, according to a model of belief processing. University campus. University staff and students. Information used to form beliefs about pharmacists' trustworthiness and classification of the information using constructs from the model of belief processing. Coders identified 92 evidence statements and 19 claims. An evaluation of the data across the scenarios using predetermined criteria showed 20 evidence statements and 11 claims to be the most salient pieces of information used to form beliefs about pharmacists' trustworthiness. In considering the pharmaceutical care scenarios, participants focused more on communication and interpersonal skills when forming a trustworthiness belief. The information could be categorized as evidence statements or claims, which are parts of arguments as described by a model of belief processing. The study participants used the pharmacists' credentials, communication skills, personableness, and appearance to form trustworthiness beliefs. Overall, they wanted pharmacists to be honest, knowledgeable, and caring. Variables used to form trustworthiness beliefs represent different levels of abstraction that can be detected and coded using a model of belief processing.

  2. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.

  3. 78 FR 8538 - Privacy Act of 1974

    Science.gov (United States)

    2013-02-06

    ... information outside the agency, and how individual record subjects can exercise their rights under the Privacy... subject individual's name (woman's maiden name, if applicable), and SSN (furnishing the SSN is voluntary...

  4. An overview of human genetic privacy.

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. © 2016 New York Academy of Sciences.

  5. Cybersecurity and Privacy - bridging the gap

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  6. SWIFT Privacy: Data Processor Becomes Data Controller

    Directory of Open Access Journals (Sweden)

    Edwin Jacobs

    2007-04-01

    Full Text Available Last month, SWIFT emphasised the urgent need for a solution to compliance with US Treasury subpoenas that provides legal certainty for the financial industry as well as for SWIFT. SWIFT will continue its activities to adhere to the Safe Harbor framework of the European data privacy legislation. Safe Harbor is a framework negotiated by the EU and US in 2000 to provide a way for companies in Europe, with operations in the US, to conform to EU data privacy regulations. This seems to conclude a complex privacy case, widely covered by the US and European media. A fundamental question in this case was who is a data controller and who is a mere data processor. Both the Belgian and the European privacy authorities considered SWIFT, jointly with the banks, as a data controller whereas SWIFT had considered itself as a mere data processor that processed financial data for banks. The difference between controller and processor has far reaching consequences.

  7. Security with Privacy - Opportunities and Challenges

    OpenAIRE

    Bertino, Elisa

    2014-01-01

    This paper summarizes opportunities and challenges concerning how we can achieve security while still ensuring privacy. It identifies research directions and includes a number of questions that have been debated by the panel.

  8. Implementation of virtual models from sheet metal forming simulation into physical 3D colour models using 3D printing

    Science.gov (United States)

    Junk, S.

    2016-08-01

    Today the methods of numerical simulation of sheet metal forming offer a great diversity of possibilities for optimization in product development and in process design. However, the results from simulation are only available as virtual models. Because there are any forming tools available during the early stages of product development, physical models that could serve to represent the virtual results are therefore lacking. Physical 3D-models can be created using 3D-printing and serve as an illustration and present a better understanding of the simulation results. In this way, the results from the simulation can be made more “comprehensible” within a development team. This paper presents the possibilities of 3D-colour printing with particular consideration of the requirements regarding the implementation of sheet metal forming simulation. Using concrete examples of sheet metal forming, the manufacturing of 3D colour models will be expounded upon on the basis of simulation results.

  9. A Diquark-Quark Model with Its Use in Nucleon Form Factors

    Institute of Scientific and Technical Information of China (English)

    WANG Hong-Min; ZHANG Ben-Ai

    2005-01-01

    The nucleon electromagnetic form factors are investigated within a simple diquark-quark model using the light-front formalism. In this model, baryon is described as a bound state of one quark and one clustering diquark.The calculational results are compared with the experimental ones. We also regard the quarks in a baryon as pointlike constituent quarks.

  10. Testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form

    DEFF Research Database (Denmark)

    Péguin-Feissolle, Anne; Strikholm, Birgit; Teräsvirta, Timo

    In this paper we propose a general method for testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form. These tests are based on a Taylor expansion of the nonlinear model around a given point in the sample space. We study the performance of our tests...

  11. Structural and reduced-form modeling and forecasting with application to Armenia

    NARCIS (Netherlands)

    Poghosyan, K.

    2012-01-01

    The thesis deals with structural and reduced-form modeling and forecasting of key macroeconomic variables (real growth of GDP, inflation, exchange rate, and policy interest rate). The central part of the thesis (Chapters 2-4) consists of three chapters. Chapter 2 considers the structural DSGE model

  12. Modeling plan-form deltaic response to changes in fluvial sediment supply

    NARCIS (Netherlands)

    Nienhuis, J.H.; Ashton, A.D.; Roos, P.C.; Hulscher, S.J.M.H.; Giosan, L.; Kranenburg, W.M.; Horstman, E.M.; Wijnberg, K.M.

    2012-01-01

    This study focuses on the effects of changes in fluvial sediment supply on the plan-form shape of wave-dominated deltas. We apply a one-line numerical shoreline model to calculate shoreline evolution after (I) elimination and (II) time-periodic variation of fluvial input. Model results suggest four

  13. Structural and reduced-form modeling and forecasting with application to Armenia

    NARCIS (Netherlands)

    Poghosyan, K.

    2012-01-01

    The thesis deals with structural and reduced-form modeling and forecasting of key macroeconomic variables (real growth of GDP, inflation, exchange rate, and policy interest rate). The central part of the thesis (Chapters 2-4) consists of three chapters. Chapter 2 considers the structural DSGE model

  14. A Reduced Form Framework for Modeling Volatility of Speculative Prices based on Realized Variation Measures

    DEFF Research Database (Denmark)

    Andersen, Torben G.; Bollerslev, Tim; Huang, Xin

    Building on realized variance and bi-power variation measures constructed from high-frequency financial prices, we propose a simple reduced form framework for effectively incorporating intraday data into the modeling of daily return volatility. We decompose the total daily return variability...... of an ACH model for the time-varying jump intensities coupled with a relatively simple log-linear structure for the jump sizes. Lastly, we discuss how the resulting reduced form model structure for each of the three components may be used in the construction of out-of-sample forecasts for the total return...

  15. Effects of Interactive Function Forms in a Self-Organized Critical Model Based on Neural Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Xiao-Wei; ZHOU Li-Ming; CHEN Tian-Lun

    2003-01-01

    Based on the standard self-organizing map neural network model and an integrate-and-fire mechanism, we introduce a kind of coupled map lattice system to investigate scale-invariance behavior in the activity of model neural populations. We let the parameter β, which together with α represents the interactive strength between neurons, have different function forms, and we find the function forms and their parameters are very important to our model's avalanche dynamical behaviors, especially to the emergence of different avalanche behaviors in different areas of our system.

  16. Invariant Measures and Asymptotic Gaussian Bounds for Normal Forms of Stochastic Climate Model

    Institute of Scientific and Technical Information of China (English)

    Yuan YUAN; Andrew J.MAJDA

    2011-01-01

    The systematic development of reduced low-dimensional stochastic climate models from observations or comprehensive high dimensional climate models is an important topic for atmospheric low-frequency variability, climate sensitivity, and improved extended range forecasting. Recently, techniques from applied mathematics have been utilized to systematically derive normal forms for reduced stochastic climate models for low-frequency variables. It was shown that dyad and multiplicative triad interactions combine with the climatological linear operator interactions to produce a normal form with both strong nonlinear cubic dissipation and Correlated Additive and Multiplicative (CAM) stochastic noise. The probability distribution functions (PDFs) of low frequency climate variables exhibit small but significant departure from Gaussianity but have asymptotic tails which decay at most like a Gaussian. Here, rigorous upper bounds with Gaussian decay are proved for the invariant measure of general normal form stochastic models. Asymptotic Gaussian lower bounds are also established under suitable hypotheses.

  17. Data Security and Privacy in Cloud Computing

    OpenAIRE

    Yunchuan Sun; Junsheng Zhang; Yongping Xiong; Guangyu Zhu

    2014-01-01

    Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user’s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more impo...

  18. Privacy: The Small and Large of It

    Energy Technology Data Exchange (ETDEWEB)

    NUSBAUM,ANNA W.

    1999-10-22

    The topic of Privacy is complex, multi-faceted, and often emotionally laden. This paper will cover the following topics, in an effort to further understanding of federal regulations and activities, the balancing act that necessarily occurs in business, and what role a records manager can play. The topics are: Definitions; The Privacy Act; ''Private'' companies; Potential areas of concern; Expectations; Corporate responsibilities; Case studies; and Records Manager's role.

  19. Privacy Preserving Recommendation System Based on Groups

    OpenAIRE

    Shang, Shang; Hui, Yuk; Hui, Pan; Cuff, Paul; Kulkarni, Sanjeev

    2013-01-01

    Recommendation systems have received considerable attention in the recent decades. Yet with the development of information technology and social media, the risk in revealing private data to service providers has been a growing concern to more and more users. Trade-offs between quality and privacy in recommendation systems naturally arise. In this paper, we present a privacy preserving recommendation framework based on groups. The main idea is to use groups as a natural middleware to preserve ...

  20. Privacy policies for health social networking sites

    OpenAIRE

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in...

  1. Privacy and legal issues in cloud computing

    CERN Document Server

    Weber, Rolf H

    2015-01-01

    Adopting a multi-disciplinary and comparative approach, this book focuses on emerging and innovative attempts to tackle privacy and legal issues in cloud computing, such as personal data privacy, security and intellectual property protection. Leading international academics and practitioners in the fields of law and computer science examine the specific legal implications of cloud computing pertaining to jurisdiction, biomedical practice and information ownership. This collection offers original and critical responses to the rising challenges posed by cloud computing.

  2. Location Privacy Issues in Wireless Sensor Networks

    Science.gov (United States)

    Kůr, Jiří; Stetsko, Andriy

    We discuss location privacy issues in wireless sensor networks. We consider sensor nodes with more responsible roles and the need to protect locations of such nodes. Available countermeasures against various types of traffic analysis attacks are examined and their problems are identified. We do not propose new traffic analysis resistance technique. Instead, we draw attention to blanks in current situation and identify several open questions, which should be answered in order to ensure location privacy of nodes.

  3. Preliminary Analysis of Google+'s Privacy

    OpenAIRE

    2011-01-01

    In this paper we provide a preliminary analysis of Google+ privacy. We identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy. We also identified that Google+ encourages the provision of other names including maiden name, which may help criminals performing identity theft. We show that Facebook lists are a superset of Google+ circles, both functionally and logically, even though Google+ provides a better user interfac...

  4. Evaluating the privacy properties of telephone metadata

    OpenAIRE

    2016-01-01

    Privacy protections against government surveillance are often scoped to communications content and exclude communications metadata. In the United States, the National Security Agency operated a particularly controversial program, collecting bulk telephone metadata nationwide. We investigate the privacy properties of telephone metadata to assess the impact of policies that distinguish between content and metadata. We find that telephone metadata is densely interconnected, can trivially be reid...

  5. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  6. Model Analysis of Initial Hydration and Structure Forming of Portland Cement

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The auto efficiently hydration heat arrangement and the non-contacting electrical resistivity device were used to test the thermology effect and the resistivity variation of Portland cement hydration.The structure forming model of Portland cement initial hydration was established through the systematical experiments with different cements, the amount of mixing water and the chemical admixture. The experimental results show that, the structure forming model of cement could be divided into three stages, i e, solution-solution equilibrium period, structure forming period and structure stabilizing period. Along with the increase of mixing water, the time of inflexion appeared is in advance for thermal process of cement hydration and worsened for the structure forming process. Comparison with the control specimen, adding Na2SO4 makes the minimum critical point lower, the flattening period shorter and the growing slope after stage one steeper. So the hydration and structure forming process of Portland cement could be described more exactly by applying the thermal model and the structure-forming model.

  7. An Anti-Counterfeiting RFID Privacy Protection Protocol

    Institute of Scientific and Technical Information of China (English)

    Xiaolan Zhang; Brian King

    2007-01-01

    The privacy problem of many RFID systems has been extensively studied. Yet integrity in RFID has notreceived much attention as regular computer systems. When we evaluate an identification protocol for an RFID system foranti-counterfeiting, it is important to consider integrity issues. Moreover, many RFID systems are accessed by multiple leveltrust parties, which makes comprehensive integrity protection even harder. In this paper, we first propose an integrity modelfor RFID protocols. Then we use the model to analyze the integrity problems in Squealing Euros protocol. Squealing Euroswas proposed by Juels and Pappu for RFID enabled banknotes that will support anti-forgery and lawful tracing yet preserveindividual's privacy. We analyze its integrity, we then discuss the problems that arise and propose some solutions to theseproblems. Then an improved protocol with integrity protection for the law enforcement is constructed, which includes anunforgeable binding between the banknote serial number and the RF ciphertext only readable to law enforcement. This sameprotocol can be applied in many other applications which require a privacy protecting anti-counterfeiting mechanism.

  8. Cyber security challenges in Smart Cities: Safety, security and privacy.

    Science.gov (United States)

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  9. Cyber security challenges in Smart Cities: Safety, security and privacy

    Directory of Open Access Journals (Sweden)

    Adel S. Elmaghraby

    2014-07-01

    Full Text Available The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  10. Trust and Privacy in Our Networked World

    Directory of Open Access Journals (Sweden)

    Herman T. Tavani

    2011-10-01

    Full Text Available Remarking on the relationship between the concepts of trust and privacy, Charles Fried (1990, p. 56 [1] writes: Trust is the attitude of expectation that another will behave according to the constraints of morality… There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right… Without privacy and the possibility of error which it protects that aspect of his humanity is denied to him. The important relationship between trust and privacy that Fried describes is often overlooked in the contemporary literature on privacy, as well in the recent publications that focus on trust and trust-related topics. The six essays included in this special issue of Information, however, give us some additional insights into certain conceptual and practical connections involving the notions of trust and privacy. In this respect, the contributing authors expand upon the insight in Fried’s classic work on the interconnection between the two concepts.[...

  11. Social networking and privacy attitudes among

    Directory of Open Access Journals (Sweden)

    Kristen A. Carruth

    2014-11-01

    Full Text Available Daily use of social networking sites (SNS such as Facebook has become routine for millions of Internet users. Facebook is currently still the most popular social media site. Social networking has been rapidly adopted by societies around the world. In particular, social media like Facebook provide sites where users can personalize a profile with their information, pictures, and videos that can be shared with other users. This information can be used in ways that may violate users’ privacy with or without their knowledge. The hypotheses were that use of Facebook, user self-efficacy for social media and users’ general attitudes about privacy expectations are predictors of specific attitudes towards Facebook social media privacy, among a sample of 284, mostly white female, undergraduate college students in their twenties. Facebook self-efficacy and Facebook personal privacy violations were significant determinants of general Internet social media privacy concerns. However, Facebook use was not a significant factor for general Internet social media privacy concerns. Perceived benefits of Facebook generally appear to outweigh risks of disclosing personal information.

  12. Users or Students? Privacy in University MOOCS.

    Science.gov (United States)

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  13. Designing solutions for securing patient privacy--meeting the demands of health care in the 21st century.

    Science.gov (United States)

    Bluml, B M; Crooks, G M

    1999-01-01

    To define the issues surrounding patient privacy, examine the political context in which debate is taking place, and present a novel technology model for addressing privacy, confidentiality, and security in 21st century health care. The discussion of privacy addresses one of the basic issues in health care today--the tension between the needs of the individual patient for privacy and confidentiality and the needs of society to effectively manage health care practices and control health care costs. Patient concerns for privacy, confidentiality, and security are legitimate, and can usually be reduced to issues that potentially affect an individual's employment, ability to get and maintain health coverage, and have control over his or her records and care. These concerns, combined with several precipitating events, are forcing the issue of privacy into the political arena, where new health policy decisions will be made. The debate must be framed within a principle-centered approach that focuses on boundaries, security, consumer control, accountability, and public responsibility. A global, distributed electronic health record management model that provides location-independent, secured, authenticated access to relevant patient care records by qualified health care professionals on a need-to-know basis provides solutions. Information asset considerations should be designed to equitably represent the ownership needs of corporate entities, society, and the individual. A secure electronic health record structure that systematically ensures a high level of accountability combined with thoughtful dialogue among key stakeholders in the public policy development process can offer the privacy outcomes we seek.

  14. Hierarchical multi-scale modeling of texture induced plastic anisotropy in sheet forming

    OpenAIRE

    Gawad, J.; van Bael, Albert; Eyckens, P.; Samaey, G.; Van Houtte, P.; Roose, D.

    2013-01-01

    In this paper we present a Hierarchical Multi-Scale (HMS) model of coupled evolutions of crystallographic texture and plastic anisotropy in plastic forming of polycrystalline metallic alloys. The model exploits the Finite Element formulation to describe the macroscopic deformation of the material. Anisotropy of the plastic properties is derived from a physics-based polycrystalline plasticity micro-scale model by means of virtual experiments. The homogenized micro-scale stress response given b...

  15. The pion electromagnetic form-factor in a QCD-inspired model

    CERN Document Server

    Pacheco-Bicudo-Cabral de Melo, J; Pace, E; Salmè, G

    2004-01-01

    We present detailed numerical results for the pion space-like electromagnetic form factor obtained within a recently proposed model of the pion electromagnetic current in a confining light-front QCD-inspired model. The model incorporates the vector meson dominance mechanism at the quark level, where the dressed photon with $q^+>0$ decay in an interacting quark-antiquark pair,wich absorbs the initial pion and produces the pion in the final state.

  16. Product Form Design Model Based on Multiobjective Optimization and Multicriteria Decision-Making

    Directory of Open Access Journals (Sweden)

    Meng-Dar Shieh

    2017-01-01

    Full Text Available Affective responses concern customers’ affective needs and have received increasing attention in consumer-focused research. To design a product that appeals to consumers, designers should consider multiple affective responses (MARs. Designing products capable of satisfying MARs falls into the category of multiobjective optimization (MOO. However, when exploring optimal product form design, most relevant studies have transformed multiple objectives into a single objective, which limits their usefulness to designers and consumers. To optimize product form design for MARs, this paper proposes an integrated model based on MOO and multicriteria decision-making (MCDM. First, design analysis is applied to identify design variables and MARs; quantification theory type I is then employed to build the relationship models between them; on the basis of these models, an MOO model for optimization of product form design is constructed. Next, we use nondominated sorting genetic algorithm-II (NSGA-II as a multiobjective evolutionary algorithm (MOEA to solve the MOO model and thereby derive Pareto optimal solutions. Finally, we adopt the fuzzy analytic hierarchy process (FAHP to obtain the optimal design from the Pareto solutions. A case study of car form design is conducted to demonstrate the proposed approach. The results suggest that this approach is feasible and effective in obtaining optimal designs and can provide great insight for product form design.

  17. MODEL OF METHODS OF FORMING BIOLOGICAL PICTURE OF THE WORLD OF SECONDARY SCHOOL PUPILS

    Directory of Open Access Journals (Sweden)

    Mikhail A. Yakunchev

    2016-12-01

    Full Text Available Introduction: the problem of development of a model of methods of forming the biological picture of the world of pupils as a multicomponent and integrative expression of the complete educational process is considered in the article. It is stated that the results of the study have theoretical and practical importance for effective subject preparation of senior pupils based on acquiring of systematic and generalized knowledge about wildlife. The correspondence of the main idea of the article to the scientific profile of the journal “Integration of Education” determines the choice of the periodical for publication. Materials and Methods: the results of the analysis of materials on modeling of the educational process, on specific models of the formation of a complete comprehension of the scientific picture of the world and its biological component make it possible to suggest a lack of elaboration of the aspect of pedagogical research under study. Therefore, the search for methods to overcome these gaps and to substantiate a particular model, relevant for its practical application by a teacher, is important. The study was based on the use of methods of theoretical level, including the analysis of pedagogical and methodological literature, modeling and generalized expression of the model of forming the biological picture of the world of secondary school senior pupils, which were of higher priority. Results: the use of models of organization of subject preparation of secondary school pupils takes a priority position, as they help to achieve the desired results of training, education and development. The model of methods of forming a biological picture of the world is represented as a theoretical construct in the unity of objective, substantive, procedural, diagnostic and effective blocks. Discussion and Conclusions: in a generalized form the article expresses the model of methods of forming the biological picture of the world of secondary school

  18. $\\pi^0\\to\\gamma^*\\gamma$ transition form factor within Light Front Quark Model

    CERN Document Server

    Lih, Chong-Chung

    2012-01-01

    We study the transition form factor of $\\pi^0\\to\\gamma^* \\gamma$ as a function of the momentum transfer $Q^2$ within the light-front quark model (LFQM). We compare our result with the experimental data by BaBar as well as other calculations based on the LFQM in the literature. We show that our predicted form factor fits well with the experimental data, particularly those at the large $Q^2$ region.

  19. Study of pesudoscalar transition form factors within light front quark model

    CERN Document Server

    Geng, Chao-Qiang

    2012-01-01

    We study the transition form factors of the pesudoscalar mesons ($\\pi,\\eta$ and $\\eta^{\\prime}$) as functions of the momentum transfer $Q^2$ within the light-front quark model. We compare our results with the recent experimental data by CELLO, CLEO, BaBar and Belle. By considering the possible uncertainties from the quark masses, we illustrate that our predicted form factors can fit with all the data, including those at the large $Q^2$ regions.

  20. Heterotic sigma models on $T^8$ and the Borcherds automorphic form $\\Phi_{12}$

    CERN Document Server

    Harrison, Sarah M; Paquette, Natalie M; Volpato, Roberto; Zimet, Max

    2016-01-01

    We consider the spectrum of BPS states of the heterotic sigma model with $(0,8)$ supersymmetry and $T^8$ target, as well as its second-quantized counterpart. We show that the counting function for such states is intimately related to Borcherds' automorphic form $\\Phi_{12}$, a modular form which exhibits automorphy for $O(2,26;{\\mathbb Z})$. We comment on possible implications for Umbral moonshine and theories of AdS$_3$ gravity.