2013 IEEE International Conference on Big Data 2013
DOI: 10.1109/bigdata.2013.6691630
|View full text |Cite
|
Sign up to set email alerts
|

Breaking the Arc: Risk control for Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…It is important that the design capabilities of identification systems be socially and ethically acceptable to be usable. 77 One promising approach is a legislation-implemented, identity assurance scheme set up by a government advisory group and delivered by certified private sector online service providers. Identity service providers under such a scheme could contract to meet certain criteria, and help promote greater public trust in the safety of online interactions, similar to the Identity Assurance Programme and its Principles currently under proposal in the UK.…”
Section: 6mentioning
confidence: 99%
“…It is important that the design capabilities of identification systems be socially and ethically acceptable to be usable. 77 One promising approach is a legislation-implemented, identity assurance scheme set up by a government advisory group and delivered by certified private sector online service providers. Identity service providers under such a scheme could contract to meet certain criteria, and help promote greater public trust in the safety of online interactions, similar to the Identity Assurance Programme and its Principles currently under proposal in the UK.…”
Section: 6mentioning
confidence: 99%
“…In other words, given an input element, it is possible to calculate the probable confidence of the result of the inference. The discussion of this is beyond the scope of this paper, but the reader is referred to [24,25].…”
Section: Superidentity Model and Visualizationmentioning
confidence: 99%
“…The model has a number of other uses in both privacy and capability management [23,25], including the ability to allow investigators' gut instinct to jump around the graph, effectively creating their own ad-hoc inferences [24,26].…”
Section: Superidentity Model and Visualizationmentioning
confidence: 99%
“…This raises a big question of security; therefore below a summary of the different levels of big data security over cloud is given. This paper extensively reviews the work carried out by different experts to minimise the risks in utilizing cloud in handling big data [23][24][25][26]. Secondly, the concrete solutions are presented to improve the security of big data in a healthcare scenario.…”
Section: Introductionmentioning
confidence: 99%