Searched for: subject:"Privacy"
(1 - 20 of 81)

Pages

document
le Feber, M. (author), Jadoenathmisier, T. (author), Goede, H. (author), Kuijpers, E. (author), Pronk, A. (author)
Will sensor-based exposure assessment be the future in workplace settings? Static instruments with embedded sensors are already applied to monitor levels of dangerous substances-in the context of acute health effects-at critical locations. However, with wearable, lightweight, miniaturized (low-cost) sensors developing quickly, much more is...
article 2021
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
Lefeber, M. (author)
Sensoren genereren data en met digitale data kun je veel automatiseren. De mogelijkheden van data based kunstmatige intelligentie lijken oneindig. Maar kunnen sensoren oak bijdragen aan een gezonde en veilige werkplek? En hoe zit het met de ethiek en de privacy? Vakmedianet
article 2020
document
van Haaften, W. (author), Sangers, A. (author), Engers, T. (author), Djafari, s. (author)
Analysing combined data sets can result in signifi cant added value for many organisations, but the GDPR has put strict constraints on processing personal data. Anonymization by using Multi-Party Computation (MPC) however may off er organizations some relief of the perceived burden of GDPR under specifi c conditions. In this paper, we will...
conference paper 2020
document
Bachlechner, D. (author), van Leishout, M.J. (author), Timan, T. (author)
Privacy has long been perceived as a hindrance to innovation. It has been considered to raise costs for data governance without providing real benefits. However, the attitude of various stakeholders towards the relationship between privacy and innovation has started to change. Privacy is increasingly embraced as an enabler of innovation, given...
bookPart 2020
document
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)
Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...
conference paper 2020
document
Kraaij, W. (author), Verberne, S. (author), Koldijk, S. (author), de Korte, E. (author), van Dantzig, S. (author), Sappelli, M. (author), Shoaib, M. (author), Bosems, S. (author), Achterkamp, R. (author), Bonomi, A. (author), Schavemaker, J. (author), Hulsebosch, B. (author), Wabeke, T. (author), Vollenbroek-Hutten, M. (author), Neerincx, M. (author), Sinderen, M. (author)
Recent advances in wearable sensor technology and smartphones enable simple and affordable collection of personal analytics. This paper reflects on the lessons learned in the SWELL project that addressed the design of user-centered ICT applications for self-management of vitality in the domain of knowledge workers. These workers often have a...
article 2020
document
Riva, G.M. (author), Vasenev, A. (author), Zannone, N. (author)
The processing of personal data is becoming a key business factor, especially for high-tech system industries such as automotive and healthcare service providers. To protect such data, the European Union (EU) has introduced the General Data Protection Regulation (GDPR), with the aim to standardize and strengthen data protection policies across...
conference paper 2020
document
van der Sanden, B. (author), Vasenev, A. (author)
conference paper 2020
document
mohajeri Parizi, M. (author), Sileno, G. (author), van Engers, T. (author)
Computational agents based upon the belief-desire-intention (BDI) architecture generally use reactive rules to trigger the execution of plans. For various reasons, certain plans might be preferred over others at design time. Most BDI agents platforms use hard-coding these preferences in some form of the static ordering of the reactive rules, but...
conference paper 2019
document
Honig, J.J. (author), Everts, M.H. (author), Huisman, M. (author)
Solidity smart contracts operate in a hostile environment, which introduces the need for the adequate application of testing techniques to ensure mitigation of the risk of a security incident. Mutation testing is one such technique. It allows for the evaluation of the efficiency of a test suite in detecting faults in a program, allowing...
conference paper 2019
document
Škorvánek, I. (author), Koops, B.J. (author), Timan, T.2. (author)
This paper analyses the implications of a new form of surveillance—sewage monitoring—for criminal procedural law. Current law has not been written with a view to covering novel, technology-enabled forms of covert data acquisition, posing a challenge of regulatory connection. To what extent are new surveillance methods, such as sewage monitoring...
conference paper 2019
document
Bomhof, F.W. (author), Giezeman, P. (author)
book 2019
document
Spini, G. (author), van Heesch, M.P.P. (author), Veugen, P.J.M. (author), Chatterjea, S. (author)
Optimizing the workflow of a complex organization such as a hospital is a difficult task. An accurate option is to use a real-time locating system to track locations of both patients and staff. However, privacy regulations forbid hospital management to assess location data of their staff members. In this exploratory work, we propose a secure...
article 2019
document
Lloyd, C. (author), Mannucci, T. (author), Bouma, H. (author), Schutte, K. (author), Huizing, A. (author)
In recent years advances in machine learning methods such as deep learning has led to significant improvements in our ability to track people and vehicles, and to recognise specific individuals. Such technology has enormous potential to enhance the performance of image-based security systems. However, wide-spread use of such technology has...
conference paper 2019
document
van Lieshout, M.J. (author), Emmert, S.B. (author)
The right to privacy is enshrined in the European charter of fundamental rights. The right to data protection is a relatively novel right, also enshrined in the same European charter. While these rights seem to focus on a defensive and protective approach, they also give rise to a positive and constructive interpretation. The GDPR may act as...
conference paper 2018
document
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...
conference paper 2018
document
Wijn, R. (author)
article 2018
document
van de Kamp, T. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author)
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitoring of relations among multiple clients. Since both the clients’ data and the predicates are encrypted, our system is suitable for situations in...
conference paper 2018
document
Veeningen, M. (author), Chatterjea, S. (author), Horváth, A.Z. (author), Spindler, G. (author), Boersma, E. (author), van der Spek, P. (author), van der GaliËn, O. (author), Gutteling, J. (author), Kraaij, W. (author), Veugen, P.J.M. (author)
conference paper 2018
Searched for: subject:"Privacy"
(1 - 20 of 81)

Pages