2019
DOI: 10.1016/j.future.2018.09.025
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving attribute aggregation in eID federations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Such architecture is squarely at odds with the idea of centralized data collection and storage that undergirds the two globally dominant ecosystems that populate the Internet. Attribute-based authentication and decentralized architectures for authentication are in principle two separate issues, but, as will be argued below, the combination of attributes and decentralization gives the best guarantees for privacy protection and user empowerment (Priestnitz Filho et al, 2018).…”
Section: Sociotechnical Aspects Of Eid Systemsmentioning
confidence: 99%
“…Such architecture is squarely at odds with the idea of centralized data collection and storage that undergirds the two globally dominant ecosystems that populate the Internet. Attribute-based authentication and decentralized architectures for authentication are in principle two separate issues, but, as will be argued below, the combination of attributes and decentralization gives the best guarantees for privacy protection and user empowerment (Priestnitz Filho et al, 2018).…”
Section: Sociotechnical Aspects Of Eid Systemsmentioning
confidence: 99%
“…The increased prevalence of cross-border movement makes the ability to recognise legal identity even more important and identity management systems have played a key role in many strategic applications including e-governance, e-commerce, business intelligence and homeland security [8]. The focus of advanced technical research on developing open standards that address interoperability, management of privacy and identity theft prevention [10]. On the social side, there have been claims that automation of the citizen-state interface can rebuild trust although the dangers of identity theft or fraud and possible threats to the privacy of individuals resulting from use of these systems have been recognised [6].…”
Section: Conceptualising Digital Identity Systems For Refugee Managementmentioning
confidence: 99%
“…Deep learning requires large amounts of data to support training. Open image databases contain a large number of images that can be used, but due to the increasing demand for privacy protection, it is becoming increasingly difficult to collect user data to a data center for deep learning training [1,7,22,27].…”
Section: Introductionmentioning
confidence: 99%
“…7 The dataset D 𝑖 has k categories of images:𝑐 0 , 𝑐 1 ...𝑐 π‘˜βˆ’1 8 π‘›π‘œπ‘–π‘ π‘’π·π‘Žπ‘‘π‘Ž ← R (𝑀, 𝐢, 𝐻,π‘Š ) 9 π‘›π‘œπ‘–π‘ π‘’π‘‡ π‘Žπ‘Ÿπ‘”π‘’π‘‘ ← randomSelect(𝑀, (𝑐 0 , 𝑐 1 ...𝑐 π‘˜βˆ’1 )) 10 π‘›π‘œπ‘–π‘ π‘’πΏπ‘œπ‘”π‘–π‘‘π‘ π‘‡ π‘Žπ‘Ÿπ‘”π‘’π‘‘ 𝑗 ← 0 for j = 0,1,2,β€’ β€’ β€’ , 𝑀 βˆ’ 1 17 π‘›π‘œπ‘–π‘ π‘’π·π‘Žπ‘‘π‘Ž ← π‘›π‘œπ‘–π‘ π‘’π·π‘Žπ‘‘π‘Ž βˆ’ βˆ‡β„“ 𝑛 (π‘›π‘œπ‘–π‘ π‘’π·π‘Žπ‘‘π‘Ž)19 gather π‘›π‘œπ‘–π‘ π‘’π·π‘Žπ‘‘π‘Ž and corresponding π‘›π‘œπ‘–π‘ π‘’πΏπ‘œπ‘”π‘–π‘‘π‘  as π‘›π‘œπ‘–π‘ π‘’π·π‘Žπ‘‘π‘Žπ‘ π‘’π‘‘ 𝑖 20 Δ𝑀 𝑑 𝑖 ← 𝑀 𝑑 βˆ’ 𝑀 𝑑 𝑖 21 return (Δ𝑀 𝑑 𝑖 , π‘›π‘œπ‘–π‘ π‘’π·π‘Žπ‘‘π‘Žπ‘ π‘’π‘‘ 𝑖 ) Algorithm 3: A summary of FedNKD (3) Input: local datasets D 𝑖 ; model parameters 𝑀; Output: AvgLogits for a client with model parameters 𝑀 1 GetAvgLogits(𝑀, D 𝑖 ): 2…”
mentioning
confidence: 99%