Academic literature on the topic 'Deletion Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deletion Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Deletion Privacy"

1

Keele. "Privacy by Deletion: The Need for a Global Data Deletion Principle." Indiana Journal of Global Legal Studies 16, no. 1 (2009): 363. http://dx.doi.org/10.2979/gls.2009.16.1.363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Minaei, Mohsen, Mainack Mondal, Patrick Loiseau, Krishna Gummadi, and Aniket Kate. "Lethe: Conceal Content Deletion from Persistent Observers." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 206–26. http://dx.doi.org/10.2478/popets-2019-0012.

Full text
Abstract:
Abstract Most social platforms offer mechanisms allowing users to delete their posts, and a significant fraction of users exercise this right to be forgotten. However, ironically, users’ attempt to reduce attention to sensitive posts via deletion, in practice, attracts unwanted attention from stalkers specifically to those (deleted) posts. Thus, deletions may leave users more vulnerable to attacks on their privacy in general. Users hoping to make their posts forgotten face a “damned if I do, damned if I don’t” dilemma. Many are shifting towards ephemeral social platform like Snapchat, which wi
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Chen, Hoda Aghaei Khouzani, and Chengmo Yang. "ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 132–48. http://dx.doi.org/10.1515/popets-2017-0009.

Full text
Abstract:
Abstract Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized accesses. However, secure deletion is very costly for solid state drives (SSDs), which unlike hard disks do not support in-place update. When applied to SSDs, both erasure-based and cryptography-based secure deletion methods inevitably incur large amount of valid data migrations and/or block erasures, which not only introduce extra latency and energy consumption, but also harm SSD lifetime. This paper proposes ErasuCrypto, a light-weight secure deletion framework with
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Lu, Zhi Han Liu, and Fang Chun Yang. "Mechanism of User Profile Complete Deletion Concerning Temporary Scenario Oriented Application of Mobile SNS." Advanced Materials Research 171-172 (December 2010): 346–49. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.346.

Full text
Abstract:
In order to ensure the privacy of user profile from disclosure when the users quit using the mobile social network service (MSNS) at temporary scenarios, the paper proposes the privacy insurance module (PIM) based on distributed mobile social network service (DMSNS), which supports triggering the user profile complete deletion on several conditions. One of the conditions the paper proposes is the customized time setting for user profile deletion and the paper also designs the mechanism and algorithms for proper complete deletion by classification, which enriches the user experience and meanwhi
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Chun-Wei, Binbin Zhang, Kuo-Tung Yang, and Tzung-Pei Hong. "Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/398269.

Full text
Abstract:
Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM) has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT) algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the lim
APA, Harvard, Vancouver, ISO, and other styles
6

Xue, Di, Li-Fa Wu, Hua-Bo Li, Zheng Hong, and Zhen-Ji Zhou. "A novel destination prediction attack and corresponding location privacy protection method in geo-social networks." International Journal of Distributed Sensor Networks 13, no. 1 (2017): 155014771668542. http://dx.doi.org/10.1177/1550147716685421.

Full text
Abstract:
Location publication in check-in services of geo-social networks raises serious privacy concerns due to rich sources of background information. This article proposes a novel destination prediction approach Destination Prediction specially for the check-in service of geo-social networks, which not only addresses the “data sparsity problem” faced by common destination prediction approaches, but also takes advantages of the commonly available background information from geo-social networks and other public resources, such as social structure, road network, and speed limits. Further considering th
APA, Harvard, Vancouver, ISO, and other styles
7

Shan, Fangfang, Hui Li, Fenghua Li, Yunchuan Guo, and Jinbo Xiong. "An Attribute-Based Assured Deletion Scheme in Cloud Computing." International Journal of Information Technology and Web Engineering 14, no. 2 (2019): 74–91. http://dx.doi.org/10.4018/ijitwe.2019040105.

Full text
Abstract:
With the rapid development of cloud computing, it has been increasingly attractive for individuals and groups to store and share data via cloud storage. Once stored in the third-party cloud storage service providers, the privacy and integrity of outsourced data should be attached with more attention as a challenging task. This article presents the attribute-based assured deletion scheme (AADS) which aims to protect and assuredly delete outsourced data in cloud computing. It encrypts outsourced data files with standard cryptographic techniques to guarantee the privacy and integrity, and assured
APA, Harvard, Vancouver, ISO, and other styles
8

Ma, Jun, Minshen Wang, Jinbo Xiong, and Yongjin Hu. "CP-ABE-Based Secure and Verifiable Data Deletion in Cloud." Security and Communication Networks 2021 (March 27, 2021): 1–14. http://dx.doi.org/10.1155/2021/8855341.

Full text
Abstract:
Cloud data, the ownership of which is separated from their administration, usually contain users’ private information, especially in the fifth-generation mobile communication (5G) environment, because of collecting data from various smart mobile devices inevitably containing personal information. If it is not securely deleted in time or the result of data deletion cannot be verified after their expiration, this will lead to serious issues, such as unauthorized access and data privacy disclosure. Therefore, this affects the security of cloud data and hinders the development of cloud computing s
APA, Harvard, Vancouver, ISO, and other styles
9

Child, Jeffrey T., Paul M. Haridakis, and Sandra Petronio. "Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use." Computers in Human Behavior 28, no. 5 (2012): 1859–72. http://dx.doi.org/10.1016/j.chb.2012.05.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goni, Kyriaki. "Deletion Process_Only you can see my history: Investigating Digital Privacy, Digital Oblivion, and Control on Personal Data Through an Interactive Art Installation." Leonardo 49, no. 4 (2016): 324–33. http://dx.doi.org/10.1162/leon_a_01285.

Full text
Abstract:
In light of recent controversies surrounding massive data collection by corporations and government agencies, digital privacy, the right to oblivion, and data ownership have become increasingly important concerns. This paper describes the author’s artwork, Deletion Process_Only you can see my history, an interactive art installation based on her eight-year personal search history in the Google search engine. While the personal search history maintains a sense of privacy, according to the company’s own declaration, the author reveals this archive to viewers in order to raise awareness and provo
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Deletion Privacy"

1

(9525917), Mohsen Minaei. "Privacy Preserving Systems With Crowd Blending." Thesis, 2020.

Find full text
Abstract:
<p>Over the years, the Internet has become a platform where individuals share their thoughts and personal information. In some cases, these content contain some damaging or sensitive information, which a malicious data collector can leverage to exploit the individual. Nevertheless, what people consider to be sensitive is a relative matter: it not only varies from one person to another but also changes through time. Therefore, it is hard to identify what content is considered sensitive or damaging, from the viewpoint of a malicious entity that does not target specific individuals, rather scaven
APA, Harvard, Vancouver, ISO, and other styles
2

Chao, Jianfu, and 趙健甫. "From The Deletion Of "Private Bank" To Talk About The Meaning Of The Amendment Of Banking Law In 1975." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/87345444157970887860.

Full text
Abstract:
碩士<br>義守大學<br>公共政策與管理學系<br>100<br>In 1975, the banking law has been amended for the first time after World War II. The whole structure was called “New Banking Law.” In new banking law, the regulations of private bank were all deleted. Private bank, which lasts hundred of years and plays an important role to our economic and financial market, now becomes a name of history. Therefore, the amendment of banking law to delete private bank in 1975 become the main point in this research paper. Thorough tracing back to the history of private bank and the transition of the position in law, looking back
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Deletion Privacy"

1

Xu, Peng, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu, and Hai Jin. "Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage." In Information Security and Privacy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60055-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Radin, Margaret Jane. "Democratic Degradation." In Boilerplate. Princeton University Press, 2012. http://dx.doi.org/10.23943/princeton/9780691155333.003.0003.

Full text
Abstract:
This chapter focuses on the democratic degradation that may be caused by the apparent replacement of the law of the state with the “law” of the firm when boilerplate is deployed in mass markets. It considers mass-market boilerplate rights deletion schemes and how the widespread use of boilerplate causes democratic degradation; for example, it threatens the distinction between public and private ordering, undermines the rule of law, and erases legal rights. The chapter also examines private law, the main legal infrastructure of the liberal notion of private ordering, and copycat boilerplate. Finally, it discusses technological protection measures (TPMs) and their implications for legal infrastructure, along with measures that might help to make TPMs less problematic from the point of view of the rule of law.
APA, Harvard, Vancouver, ISO, and other styles
3

"Deleting Personal Information Held by the Police." In Criminal Records, Privacy and the Criminal Justice System: A Practical Handbook. Bloomsbury Professional, 2019. http://dx.doi.org/10.5040/9781526507020.chapter-004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mogollon, Manuel. "Confidentiality." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch004.

Full text
Abstract:
In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement, insertion, or deletion; (2) the message is coming from the source from which it claims to come; (3) the message is protected against unauthorized individuals reading information that is supposed to be kept private; and (4) there is protection against an individual denying that the individual sent or received a message. These assurances are provided through the use of security mechanisms. Chapters IV, V, VI, and VII discuss security mechanisms such as confidentiality, integrity, and access authentication that are used to implement the security services listed above. This chapter covers two types of symmetric encryption: stream ciphers and block ciphers. The theory behind using shift registers as stream ciphers, as well as the DES and the Advanced Encryption Standard (AES), are also covered in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
5

Schwartz, Charles E., Fiorella Gurrieri, and Giovanni Neri. "Intellectual Disability Syndromes." In Neurobiology of Mental Illness, edited by Joseph D. Buxbaum. Oxford University Press, 2013. http://dx.doi.org/10.1093/med/9780199934959.003.0076.

Full text
Abstract:
Intellectual disability (ID) constitutes a spectrum of chronic human diseases that occur in about 1-3% of the population. This spectrum includes those precipitated by environmental factors as well as genetic disorders, the latter including some that are relatively prevalent, such as Down syndrome and fragile X syndrome, to rather “private” conditions limited to a few individuals with small chromosomal duplications or deletions. With the assistance of tremendous advances in technology – chromosome microarray analysis and next generation sequencing – it is now possible to arrive at a genetic diagnosis in a significant proportion of individuals with such forms of ID. Clinical evaluation remains the most effective means by which a clinician can prioritize diagnostic approaches to pursue for an individual with ID. This chapter briefly describes the clinical aspects of selected ID syndromes, grouped by the mode of inheritance. The selection was done with the goal of illustrating better known as well as less well known molecular pathways and cellular compartments whose disruption results in ID in association with additional clinical features. These pathways and compartments represent important modules for study using neurobiological methods, and for improved neuronal and neural systems-level understanding of the biology of typical brain function and of the pathophysiology of mental illness.
APA, Harvard, Vancouver, ISO, and other styles
6

Pournelle, Jerry. "Dealing with Spam." In 1001 Computer Words You Need to Know. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195167757.003.0012.

Full text
Abstract:
If you’ve used e-mail for any time at all, you’ve no doubt had your inbox deluged with messages pitching aphrodisiacs, mortgages, junk stocks, pornography, and substances that claim to help you lose weight in your sleep. But don’t despair. Such messages don’t have to be part of the Internet experience. You can avoid them, or certainly reduce the annoyance level, with a few simple measures. Some spammers harvest e-mail addresses from the Internet by using a “spider” (also known as a robot or crawler)—a computer program that creeps through the World Wide Web collecting information you’d prefer to keep private. So the better you are at hiding your address from faceless prowlers, the less spam you will receive. 1. If your Internet Service Provider gives you the choice, create a long, fairly complicated address preceding the @; don’t just use your first name: donquixote@example.com is better than don@example.com. Better still is donquixotedelamancha@example. com. It may be unwieldy, but your friends can always use a nickname—or just click on your address. Happily, longer addresses confuse spammers, who—without having exact user accounts in hand—use a “dictionary attack” to find them, testing the validity of every possible address from lists of common words and names: arline@example.com, barbara@example.com, and so forth. 2. Again, unless some online service makes it mandatory, don’t use your e-mail address as part of a login name or identity. However convenient that might make it when logging in to eBay, it’s equally convenient for spammers. 3. Use a second, public address for nonpersonal mail and for public posting. Create a free account with Hotmail, Yahoo, or Excite, or set up another screen name if you use either AOL or another Internet Service Provider that allows you to have multiple addresses. This keeps your main address private and exposes only your public address to spammers. Check the public account at least occasionally, in case something innocent has come in. Then massively delete the rest. It’s important to learn how your e-mail client (the program you use to send and receive e-mail) handles thorough deleting; in Outlook Express, for example, you have to delete an e-mail you don’t want from your inbox, delete it from the “Deleted” folder, and then compact folders before you are genuinely rid of it.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Deletion Privacy"

1

Reardon, J., D. Basin, and S. Capkun. "SoK: Secure Data Deletion." In 2013 IEEE Symposium on Security and Privacy (SP) Conference. IEEE, 2013. http://dx.doi.org/10.1109/sp.2013.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Dipalee, and Rajesh Ingle. "Privacy-preserving deletion to generalization-based anonymous database." In the CUBE International Information Technology Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2381716.2381803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Roche, Daniel S., Adam Aviv, and Seung Geol Choi. "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence." In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. http://dx.doi.org/10.1109/sp.2016.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Block, Alexander R., and Jeremiah Blocki. "Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!