[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Biega et al., 2014 - Google Patents

Probabilistic prediction of privacy risks in user search histories

Biega et al., 2014

View PDF
Document ID
12502265306959750866
Author
Biega J
Mele I
Weikum G
Publication year
Publication venue
Proceedings of the First International Workshop on Privacy and Secuirty of Big Data

External Links

Snippet

This paper proposes a new model of user-centric, global, probabilistic privacy, geared for today's challenges of helping users to manage their privacy-sensitive information across a wide variety of social networks, online communities, QA forums, and search histories. Our …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30964Querying
    • G06F17/30967Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/101Collaborative creation of products or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2216/00Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F17/30 and subgroups

Similar Documents

Publication Publication Date Title
Katyal Private accountability in the age of artificial intelligence
Pilán et al. The text anonymization benchmark (tab): A dedicated corpus and evaluation framework for text anonymization
Ohm Broken promises of privacy: Responding to the surprising failure of anonymization
Ohm Sensitive information
Sousa et al. How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing
Sánchez et al. C‐sanitized: A privacy model for document redaction and sanitization
Mukherjee et al. People on drugs: credibility of user statements in health communities
Yakowitz Tragedy of the data commons
Heffetz et al. Privacy and data-based research
Li et al. New threats to health data privacy
Chen et al. A text mining approach to assist the general public in the retrieval of legal documents
Guarino et al. An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information
US20140283097A1 (en) Anonymizing Sensitive Identifying Information Based on Relational Context Across a Group
Blanke Protection for ‘Inferences drawn’: A comparison between the general data protection regulation and the california consumer privacy act
Maris et al. Tracking sex: The implications of widespread sexual data leakage and tracking on porn websites
Biega et al. Probabilistic prediction of privacy risks in user search histories
Sokolova et al. Personal privacy protection in time of big data
Ali et al. Fake news detection techniques on social media: A survey
O’Neill et al. The risks to patient privacy from publishing data from clinical anesthesia studies
Biega et al. R-susceptibility: An ir-centric approach to assessing privacy risks for users in online communities
Sokolovska et al. Integrating technical and legal concepts of privacy
US20230267371A1 (en) Apparatus, method and computer program for generating de-identified training data for conversational service
Fazlioglu Beyond the nature of data: Obstacles to protecting sensitive information in the European Union and the United States
Gambarelli et al. Is your model sensitive? SPEDAC: A New resource for the automatic classification of sensitive personal data
Aonghusa et al. Don’t let Google know I’m lonely