PPT-Towards Privacy-Sensitive Participatory Sensing

Author : mitsue-stanley | Published Date : 2016-07-10

KL Huang S S Kanhere and W Hu Presented by Richard Lin Zhou Overview Significance of Privacy Sensitiveness Earlier Developments Tessellation Microaggregation

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Towards Privacy-Sensitive Participatory ..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Towards Privacy-Sensitive Participatory Sensing: Transcript


KL Huang S S Kanhere and W Hu Presented by Richard Lin Zhou Overview Significance of Privacy Sensitiveness Earlier Developments Tessellation Microaggregation Combining both techniques . Timothy W. Hnat. , Vijay . Shrinivasan. , . Jiakang. Lu, . Tamim. I. . Sookoor. , Raymond Dawson, John . Stankovic. , and . Kamin. Whitehouse. 1. Sensing in Homes. 2. Medical. Monitoring. Home. Automation. Thompson, S. 2009. University of Central Florida EECS. Definition: Urban Computing. Urban computing. is an emerging field of study that focuses on the use of technology in . public environments. such as cities, parks, forests and suburbs. It also studies the interaction between humans and such . Privacy at DHS: Protecting Personal Information. . Reviewed, DIR-T USCGAUX. Privacy at DHS: . Protecting Personal Information. Introduction. Hi, I'm the DHS Privacy Man. For the next 15 to 20 minutes, I want to talk to you about the importance of safeguarding personal information, such as Social Security numbers, that DHS may collect or store in its databases or in paper files. Congress and OMB have mandated privacy training for both employees and contractors at all federal agencies to help staff identify and mitigate privacy risks related to sensitive personal information, which I will define in a moment.. r. eform for . APP entities (agencies. ). Privacy Awareness Week. www.oaic.gov.au. Asia Pacific Privacy Authorities . What does the Privacy Act cover?. Privacy Act 1988 . provides for the . protection of an individual’s personal . von Känel. Philipp Sommer. Roger . Wattenhofer. Ikarus. : Large-scale Participatory Sensing at High Altitudes. Over 5 billion mobile phones worldwide (. 72.6% of world population) . Smartphones account for 19% of sales in 2010. Dr Tina Cook. Reader in Inclusive Methodologies. Northumbria University. tina.cook@northumbria.ac.uk. 1. Introduction to issues. the key issues relating to articulating . impact of participatory research . Paradigm. Richard Spires . June 23, 2015. Data Protection and Privacy: A New Paradigm. 2. Resilient . Network. Systems. . – All Rights Reserved. Existing . security/identity models are inadequate:. An Introduction and Survey of Applications. Objectives. Description of theory. Discussion of important results. Study of relevant applications. Introduction to the Problem. CS is a new paradigm that makes possible fast acquisition of data using few number of samples. Regulatory Issues & Judicial Developments. SHAH MURAD. Assistant Professor - Law . Federal Urdu University of Arts, Sciences and Technology (FUUAST), Karachi, Pakistan. Email: . shahmurad@live.com. Presented By. Vignesh Saravanaperumal. EEL 6788. Introduction. Urban sensing:. . Risk Possessed:. Confidentiality and Privacy. Integrity. Availability. Traffic pattern Observed:. Continuous Monitoring – Health care application. Prepared by: Eng. . Hiba. Ramadan. Supervised by: . Dr. . Rakan. . Razouk. . Outline. Introduction. key directions in the field of privacy-preserving data mining. Privacy-Preserving Data Publishing. Nan Li. Informed Consent in the Mozilla Browser:. Implementing Value-Sensitive Design. 10/13/2009. 08-534 Usability Privacy and Security . Agenda. Value-Sensitive Design (VSD) . Criteria and issues of informed consent online. Michael Ruffing. CS 495. Paper Info. Published in September 2010. Dartmouth College – joint effort between graduate students and professors (Mobile Sensing Group). Outline . Current Mobile Phone Sensing. k-Anonymity, l-Diversity, t-Closeness, and . Reconstruction Attacks. 1. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. . Ninghui Li, . Tiancheng. Li, and Suresh . Venkatasubramanian. . In ICDE, April 2007.

Download Document

Here is the link to download the presentation.
"Towards Privacy-Sensitive Participatory Sensing"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents