Biega et al., 2014 - Google Patents
Probabilistic prediction of privacy risks in user search historiesBiega et al., 2014
View PDF- Document ID
- 12502265306959750866
- Author
- Biega J
- Mele I
- Weikum G
- Publication year
- Publication venue
- Proceedings of the First International Workshop on Privacy and Secuirty of Big Data
External Links
Snippet
This paper proposes a new model of user-centric, global, probabilistic privacy, geared for today's challenges of helping users to manage their privacy-sensitive information across a wide variety of social networks, online communities, QA forums, and search histories. Our …
- 238000002474 experimental method 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30964—Querying
- G06F17/30967—Query formulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/101—Collaborative creation of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2216/00—Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F17/30 and subgroups
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Katyal | Private accountability in the age of artificial intelligence | |
Pilán et al. | The text anonymization benchmark (tab): A dedicated corpus and evaluation framework for text anonymization | |
Ohm | Broken promises of privacy: Responding to the surprising failure of anonymization | |
Ohm | Sensitive information | |
Sousa et al. | How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing | |
Sánchez et al. | C‐sanitized: A privacy model for document redaction and sanitization | |
Mukherjee et al. | People on drugs: credibility of user statements in health communities | |
Yakowitz | Tragedy of the data commons | |
Heffetz et al. | Privacy and data-based research | |
Li et al. | New threats to health data privacy | |
Chen et al. | A text mining approach to assist the general public in the retrieval of legal documents | |
Guarino et al. | An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information | |
US20140283097A1 (en) | Anonymizing Sensitive Identifying Information Based on Relational Context Across a Group | |
Blanke | Protection for ‘Inferences drawn’: A comparison between the general data protection regulation and the california consumer privacy act | |
Maris et al. | Tracking sex: The implications of widespread sexual data leakage and tracking on porn websites | |
Biega et al. | Probabilistic prediction of privacy risks in user search histories | |
Sokolova et al. | Personal privacy protection in time of big data | |
Ali et al. | Fake news detection techniques on social media: A survey | |
O’Neill et al. | The risks to patient privacy from publishing data from clinical anesthesia studies | |
Biega et al. | R-susceptibility: An ir-centric approach to assessing privacy risks for users in online communities | |
Sokolovska et al. | Integrating technical and legal concepts of privacy | |
US20230267371A1 (en) | Apparatus, method and computer program for generating de-identified training data for conversational service | |
Fazlioglu | Beyond the nature of data: Obstacles to protecting sensitive information in the European Union and the United States | |
Gambarelli et al. | Is your model sensitive? SPEDAC: A New resource for the automatic classification of sensitive personal data | |
Aonghusa et al. | Don’t let Google know I’m lonely |