Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Alisa Pankova"'
Autor:
Peeter Laud, Alisa Pankova
Publikováno v:
BMC Medical Genomics, Vol 11, Iss S4, Pp 33-46 (2018)
Abstract Background Practical applications for data analysis may require combining multiple databases belonging to different owners, such as health centers. The analysis should be performed without violating privacy of neither the centers themselves,
Externí odkaz:
https://doaj.org/article/8b25c7678c5e42d7b3456f9643168b06
Autor:
Marlon Dumas, Reedik Tuuling, Joosep Jääger, Maksym Yerokhin, Aivo Toots, Raimundas Matulevičius, Martin Pettai, Alisa Pankova, Pille Pullonen-Raudvere, Luciano García-Bañuelos, Peeter Laud
Publikováno v:
International Journal on Software Tools for Technology Transfer. 24:183-203
Privacy regulations, such as GDPR, impose strict requirements to organizations that store and process private data. Privacy-enhancing technologies (PETs), such as secure multi-party computation and differential privacy, provide mechanisms to perform
Publikováno v:
Information Systems. 115:102161
The applicability of process mining techniques hinges on the availability of event logs capturing the execution of a business process. In some use cases, particularly those involving customer-facing processes, these event logs may contain private inf
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 2, Pp 175-208 (2020)
The meaning of differential privacy (DP) is tightly bound with the notion of distance on databases, typically defined as the number of changed rows. Considering the semantics of data, this metric may be not the most suitable one, particularly when a
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
Autor:
Alisa Pankova, Jan Willemson
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4f0f3ea01527808bbeb33dc93030562f
https://doi.org/10.1007/978-3-031-09234-3_16
https://doi.org/10.1007/978-3-031-09234-3_16
Publikováno v:
2021 IEEE Symposium on Visualization for Cyber Security (VizSec).
Autor:
Alisa Pankova, Joosep Jääger
Publikováno v:
Proceedings of the 15th Workshop on Programming Languages and Analysis for Security.
Logic Programming (LP) is considered to be relatively simple for non-programmers, and allows the developer to focus on developing facts and rules of a logical derivation, and not on algorithms. Secure multiparty computation (MPC) is a methodology tha
Autor:
Christopher Davison, Michael Hay, Christopher T. Graves, Nalini Venkatasubramanian, Roberto Yus, Dave Archer, Shantanu Sharma, Mamadou H. Diallo, Xi He, Guoxi Wang, Dhrubajyoti Ghosh, Michael August, Alisa Pankova, Peeter Laud, Georgios Bouloukakis, Gerome Miklau, Steve Lu, Ashwin Machanavajjhala, Sharad Mehrotra
Publikováno v:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 2020, pp.154851292095638. ⟨10.1177/1548512920956383⟩
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 2020, pp.154851292095638. ⟨10.1177/1548512920956383⟩
International audience; This paper describes the collaborative effort between privacy and security researchers at nine different institutions along with researchers at the Naval Information Warfare Center to deploy, test, and demonstrate privacy-pres
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5d55fd6980c2f91fea32ff90d819e360
https://hal.inria.fr/hal-03039540
https://hal.inria.fr/hal-03039540
Autor:
Alisa Pankova, Gamal Elkoumy, Matthias Weidlich, Marlon Dumas, Stephan A. Fahrenkrog-Petersen, Peeter Laud
Publikováno v:
Enterprise, Business-Process and Information Systems Modeling ISBN: 9783030494179
BPMDS/EMMSAD@CAiSE
BPMDS/EMMSAD@CAiSE
Process mining is a family of techniques for analyzing business processes based on event logs extracted from information systems. Mainstream process mining tools are designed for intra-organizational settings, insofar as they assume that an event log
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3eeeacea8d24e38f11a88246ed77b55f
https://doi.org/10.1007/978-3-030-49418-6_11
https://doi.org/10.1007/978-3-030-49418-6_11
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 4, Pp 23-76 (2017)
This paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction performs