8 resultados para data privacy laws
Resumo:
Cloud computing technology has rapidly evolved over the last decade, offering an alternative way to store and work with large amounts of data. However data security remains an important issue particularly when using a public cloud service provider. The recent area of homomorphic cryptography allows computation on encrypted data, which would allow users to ensure data privacy on the cloud and increase the potential market for cloud computing. A significant amount of research on homomorphic cryptography appeared in the literature over the last few years; yet the performance of existing implementations of encryption schemes remains unsuitable for real time applications. One way this limitation is being addressed is through the use of graphics processing units (GPUs) and field programmable gate arrays (FPGAs) for implementations of homomorphic encryption schemes. This review presents the current state of the art in this promising new area of research and highlights the interesting remaining open problems.
Resumo:
We present a numerical and theoretical study of intense-field single-electron ionization of helium at 390 nm and 780 nm. Accurate ionization rates (over an intensity range of (0.175-34) X10^14 W/ cm^2 at 390 nm, and (0.275 - 14.4) X 10^14 W /cm^2 at 780 nm) are obtained from full-dimensionality integrations of the time-dependent helium-laser Schroedinger equation. We show that the power law of lowest order perturbation theory, modified with a ponderomotive-shifted ionization potential, is capable of modelling the ionization rates over an intensity range that extends up to two orders of magnitude higher than that applicable to perturbation theory alone. Writing the modified perturbation theory in terms of scaled wavelength and intensity variables, we obtain to first approximation a single ionization law for both the 390 nm and 780 nm cases. To model the data in the high intensity limit as well as in the low, a new function is introduced for the rate. This function has, in part, a resemblance to that derived from tunnelling theory but, importantly, retains the correct frequency-dependence and scaling behaviour derived from the perturbative-like models at lower intensities. Comparison with the predictions of classical ADK tunnelling theory confirms that ADK performs poorly in the frequency and intensity domain treated here.
Resumo:
We present high-accuracy calculations of ionization rates of helium at UV (195 nm) wavelengths. The data are obtained from full-dimensionality integrations of the helium-laser time-dependent Schrödinger equation. Comparison is made with our previously obtained data at 390 nm and 780 nm. We show that scaling laws introduced by Parker et al extend unmodified from the near-infrared limit into the UV limit. Static-field ionization rates of helium are also obtained, again from time-dependent full-dimensionality integrations of the helium Schrödinger equation. We compare the static-field ionization results with those of Scrinzi et al and Themelis et al, who also treat the full-dimensional helium atom, but with time-independent methods. Good agreement is obtained.
Resumo:
Privacy has now become a major topic not only in law but in computing, psychology, economics and social studies, and the explosion in scholarship has made it difficult for the student to traverse the field and identify the significant issues across the many disciplines. This series brings together a collection of significant papers with a multi-disciplinary approach which enable the reader to navigate through the complexities of the issues and make sense of the prolific scholarship published in this field.
The three volumes in this series address different themes: an anthropological approach to what privacy means in a cultural context; the issue of state surveillance where the state must both protect the individual and protect others from that individual and also protect itself; and, finally, what privacy might mean in a world where government and commerce collect data incessantly. The regulation of privacy is continually being called for and these papers help enable understanding of the ethical rationales behind the choices made in the sphere of regulation of privacy.
The articles presented in each of these collections have been chosen for the quality of their scholarship and their utility to the researcher, and feature a variety of approaches. The articles which debate the technical context of privacy are accessible to those from the arts and humanities; overall, the breadth of approach taken in the choice of articles has created a series which is an invaluable and important resource for lecturers, researchers and student.
Resumo:
Autonomous agents may encapsulate their principals' personal data attributes. These attributes may be disclosed to other agents during agent interactions, producing a loss of privacy. Thus, agents need self-disclosure decision-making mechanisms to autonomously decide whether disclosing personal data attributes to other agents is acceptable or not. Current self-disclosure decision-making mechanisms consider the direct benefit and the privacy loss of disclosing an attribute. However, there are many situations in which the direct benefit of disclosing an attribute is a priori unknown. This is the case in human relationships, where the disclosure of personal data attributes plays a crucial role in their development. In this paper, we present self-disclosure decision-making mechanisms based on psychological findings regarding how humans disclose personal information in the building of their relationships. We experimentally demonstrate that, in most situations, agents following these decision-making mechanisms lose less privacy than agents that do not use them. (C) 2012 Elsevier Inc. All rights reserved.
Resumo:
The study of interrelationships between soil structure and its functional properties is complicated by the fact that the quantitative description of soil structure is challenging. Soil scientists have tackled this challenge by taking advantage of approaches such as fractal geometry, which describes soil architectural complexity through a scaling exponent (D) relating mass and numbers of particles/aggregates to particle/aggregate size. Typically, soil biologists use empirical indices such as mean weight diameters (MWD) and percent of water stable aggregates (WSA), or the entire size distribution, and they have successfully related these indices to key soil features such as C and N dynamics and biological promoters of soil structure. Here, we focused on D, WSA and MWD and we tested whether: D estimated by the exponent of the power law of number-size distributions is a good and consistent correlate of MWD and WSA; D carries information that differs from MWD and WSA; the fraction of variation in D that is uncorrelated with MWD and WSA is related to soil chemical and biological properties that are thought to establish interdependence with soil structure (e.g., organic C, N, arbuscular mycorrhizal fungi). We analysed observational data from a broad scale field study and results from a greenhouse experiment where arbuscular mycorrhizal fungi (AMF) and collembola altered soil structure. We were able to develop empirical models that account for a highly significant and large portion of the correlation observed between WSA and MWD but we did not uncover the mechanisms that underlie this correlation. We conclude that most of the covariance between D and soil biotic (AMF, plant roots) and abiotic (C. N) properties can be accounted for by WSA and MWD. This result implies that the ecological effects of the fragmentation properties described by D and generally discussed under the framework of fractal models can be interpreted under the intuitive perspective of simpler indices and we suggest that the biotic components mostly impacted the largest size fractions, which dominate MWD, WSA and the scaling exponent ruling number-size distributions. (C) 2010 Elsevier Ltd. All rights reserved.
Resumo:
Biometric systems provide a valuable service in helping to identify individuals from their stored personal details. Unfortunately, with the rapidly increasing use of such systems, there is a growing concern about the possible misuse of that information. To counteract the threat, the European Union (EU) has introduced comprehensive legislation that seeks to regulate data collection and help strengthen an individual’s right to privacy. This article looks at the implications of the legislation for biometric system deployment. After an initial consideration of current privacy concerns, it examines what is meant by ‘personal data’ and its protection, in legislation terms. Also covered are issues around the storage of biometric data, including its accuracy, its security, and justification for what is collected. Finally, the privacy issues are illustrated through three biometric use cases: border security, online bank access control and customer profiling in stores.
Resumo:
The privacy of voice over IP (VoIP) systems is achieved by compressing and encrypting the sampled data. This paper investigates in detail the leakage of information from Skype, a widely used VoIP application. In this research, it has been demonstrated by using the dynamic time warping (DTW) algorithm, that sentences can be identified with an accuracy of 60%. The results can be further improved by choosing specific training data. An approach involving the Kalman filter is proposed to extract the kernel of all training signals.