SlideShare uma empresa Scribd logo
1 de 25
COGNITIVE 2014 – Venice Italy
Towards Agent-based Data Privacy Engineering
Kato Mivule, D.Sc.
Computer Science Department
Bowie State University
Kato Mivule - Bowie State University Department of Computer Science
Engineering
Privacy
Data
Outline
• Introduction
• The Problem
• Contributions
• Methodology
• Results and Discussion
• Results
• Discussion
• Conclusion and Future work
• Conclusion
• Future work
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Motivation
• To create a systematic framework that can be followed for the
data privacy engineering process. Could we have agents that
autonomously implement privacy?
• Given any original dataset X, a set of data privacy engineering
phases should be followed from start to completion in the
generation of a privatized dataset Y.
Contributions
• A proposed agent-based data privacy and utility engineering
framework, SIED.
• A proposed agent-based Privacy Parameter Mapping Heuristic.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Motivation
• Data Privacy Engineering – embedding legal privacy
definitions in technology and governance, Kenny and Borking
(2002).
• Design intelligent autonomous data privacy agents.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Wooldridge (1997): Three essential considerations (i) Agent
Specifications, (ii) agent implementation, and lastly (iii) agent
validation.
• Wooldridge and Jennings (1999): Avoid common pitfall - the
tendency to offer generic architectures for intelligent agents.
• Jennings (2000): Agent based software engineering remains
complex and difficult, due to the interactions between different
components.
• Borking and Raab (2001): called for Privacy Enhancing
Technologies (PETs) from a legal perspective on technology.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Kenny and Borking (2002): “Privacy engineering” as
embedding privacy legal requirements into technological and
governance blueprints.
• Van Blarkom, Borking, and Olk (2003): PETs would be
helpful in tackling privacy threats caused by intelligent agents
that illegally disclose a user’s personal information.
• Léauté and Faltings (2009): proposed an agent based privacy
engineering solution using constraint satisfaction model by
mapping out privacy constraints in the domain.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Cavoukian (2011): outlined seven privacy by design principles
that included:
• (i) proactive, not reactive; preventative not remedial.
• (ii) engineering privacy as the default.
• (iii) privacy embedded into design.
• (iv) full privacy functionality by avoiding needless trade-offs.
• (v) end-to-end security and life cycle protection.
• (vi) visibility and transparency of privacy practices.
• (vii) respect for user privacy.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Such, Espinosa, and Garcia-Fornes (2012): Privacy violations
that autonomous agents engage include:
• (i) secondary use, such as profiling,
• (ii) identity theft
• (iii) spy agents
• (iv) unauthorized access
• (v) traffic analysis
• (vi) unauthorized dissemination of data.
• Such et.al., argued: agent based privacy solutions should be
incorporated in the design of information technology systems.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework
• SIED phases – Specifications, Implementation, Evaluation, and
Dissemination
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Implementation Phase:
Bowie State University Department of Computer Science
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Evaluation Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Dissemination Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Dissemination Phase.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – Privacy Parameter Mapping Heuristic.
• Categorize parameters for effective fine-tuning.
•What parameters need adjustment in the data privacy process?
COGNITIVE 2014 – Venice Italy
CATEGORY 1
PARAMETERS
CATEGORY 2
PARAMETERS
CATEGORY 3
PARAMETERS
Data Utility Goal Parameters:
For example Accuracy, Currency,
and Completeness.
Data Privacy Algorithm Parameters:
Values k in k-anonymity, ε in Noise
addition and Differential privacy.
Application Parameters (e.g. Machine
Learning Classifier):
For example weak learners in
AdaBoost.
Parameter
Adjustment and
Fine-tuning
Trade-offs
Data Privacy and Utility
Preservation
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Experiment Results – Non-Interactive Differential Privacy (DP)
COGNITIVE 2014 – Venice Italy
Data Specifications and Requirements
• Used the Fisher Iris data set at the UCI
repository
• Contained 150 data points – multivariate
• Both numeric and categorical data items
• Applied vertical partitioning
• Applied data privacy to only numerical
data
• Applied data privacy to each vertical
partition
• Used differential privacy as SDC method
• Evaluated data utility using machine
learning as a gauge
• Publication of privatized data was non-
interactive mode
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Results – Non-Interactive Differential Privacy (DP) and Signal
Processing (Filtering)
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Results – Non-Interactive Differential Privacy – Non-filtered and
Filtered DP Classification Error
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Conclusion
• An abstract view of SIED, an agent-based data privacy
engineering framework has been presented.
• We believe that this a contribution to the privacy-by-design
challenge.
• A survey of related work on agent-based software engineering
and the influence on data privacy engineering, has been
presented.
• While SIED is proposed as a framework for agent-based data
privacy engineering, it could be generalized for other non-agent-
based data privacy processing as well.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Conclusion
• The subject of data privacy remains a challenge and more
research, design, implementation, and metrics is needed to
accommodate the ambiguous and fuzzy privacy requirements of
individuals and entities.
• We believe that intelligent agent-based architectures offer
optimism for data privacy solutions.
• For future works, we plan on expanding this study to take a
decomposition approach in dealing with the complexity of agent-
based data privacy engineering.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
References
[1] A. Cavoukian, Privacy by Design… Take the Challenge. Information & Privacy Commissioner of Ontario, 2009.
[2] A. Cavoukian, S. Taylor, and M. Abrams, “Privacy by Design: Essential for Organisational Accountability and Strong Business Practices.,” Identity Inf. Soc., vol. 3, no. 2, 2010, pp. 405–413.
[3] V. G. Cerf, “Freedom and the social contract,” Commun. ACM, vol. 56, no. 9, 2013, pp. 7.
[4] S. Spiekermann, “The challenges of privacy by design,” Commun. ACM, vol. 55, no. 7, Jul. 2012, pp. 38.
[5] V. Katos, F. Stowell, and P. Bednar, “Surveillance , Privacy and the Law of Requisite Variety,” 2011, pp. 123–139.
[6] K. Mivule, D. Josyula, and C. Turner, “An Overview of Data Privacy in Multi-Agent Learning Systems,” in the fifth COGNITIVE, 2013, no. c, pp. 14–20.
[7] K. Mivule and C. Turner, “A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge,” Procedia Comput. Sci., vol. 20, 2013, pp. 414–419.
[8] R. Dayarathna, “Taxonomy for Information Privacy Metrics,” J. Int. Commer. Law Technol., vol. 6, no. 4, 2011, pp. 194–206.
[9] G. J. Matthews and O. Harel, “Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy,” Stat. Surv., vol. 5, 2011, pp. 1–29.
[10] I. Sommerville, Software Engineering, 9th ed. Addison-Wesley, 2010, pp. 27–50.
[11] G. Booch, Object Oriented Analysis & Design with Application. Santa Clara, CA: Addison-Wesley, 1994, pp. 14–20.
[12] M. Wooldridge, “Agent-based software engineering,” IEE Proc. - Softw. Eng., vol. 144, no. 1, 1997, pp. 26.
[13] M. J. Wooldridge and N. R. Jennings, “Software engineering with agents: Pitfalls and pratfalls.,” IEEE Internet Comput., vol. 3, no. Jun, 1999, pp. 20–27.
[14] N. R. Jennings, “On agent-based software engineering,” Artif. Intell., vol. Volume 117, no. 2, 2000, pp. 277–296.
[15] J. J. Borking and C. Raab, “Laws, PETs and other technologies for privacy protection.,” J. Information, Law Technol., vol. 1, 2001, pp. 1–14.
[16] S. Kenny and J. Borking, “The Value of Privacy Engineering,” J. Information, Law Technol., vol. 2., no. 1, 2002.
[17] G. W. Van Blarkom, J. J. Borking, and J. G. E. Olk, Handbook of privacy and privacy-enhancing technologies. The Hague: College Bescherming Persoonsgegevens, 2003, pp. 1–4.
[18] F. L. y López, M. Luck, and M. D’Inverno, “A Normative Framework for Agent-Based Systems,” Comput. Math. Organ. Theory, vol. 12, no. 2–3, 2004, pp. 227–250.
[19] P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, “Tropos: An agent-oriented software development methodology.,” Auton. Agent. Multi. Agent. Syst., vol. 8, no. 3, 2004, pp. 203–236.
[20] F. Zambonelli and A. Omicini, “Challenges and research directions in agent-oriented software engineering,” Auton. Agent. Multi. Agent. Syst., vol. 9, no. 3, pp. 253–283.
[21] S. Park and V. Sugumaran, “Designing multi-agent systems: a framework and application,” Expert Syst. Appl., vol. 28, no. 2, Feb. 2005, pp. 259–271.
[22] F. Bellifemine, G. Caire, A. Poggi, and G. Rimassa, “JADE: A software framework for developing multi-agent applications. Lessons learned,” Inf. Softw. Technol., vol. 50, no. 1–2, Jan. 2008, pp. 10–21.
[23] D. Weyns, H. V. D. Parunak, and O. Shehory, “The Future of Software Engineering and Multi-Agent Systems,” Int. J. Agent-Oriented Softw. Eng., vol. 3, no. 4, 2008, pp. 1–8.
[24] M. Cossentino, N. Gaud, V. Hilaire, S. Galland, and A. Koukam, “ASPECS: an agent-oriented software process for engineering complex systems,” Auton. Agent. Multi. Agent. Syst., vol. 20, no. 2, Jun. 2009, pp. 260–304.
[25] T. Leaute and B. Faltings, “Privacy-Preserving Multi-agent Constraint Satisfaction,” in 2009 International Conference on Computational Science and Engineering, 2009, pp. 17–25.
[26] J. M. Gascueña, E. Navarro, and A. Fernández-Caballero, “Model-driven engineering techniques for the development of multi-agent systems,” Eng. Appl. Artif. Intell., vol. 25, no. 1, 2012, pp. 159–173, Feb.
[27] A. Cavoukian, Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices. Office of the Information and Privacy Commissioner (2011), 2011.
[28] J. M. Such, A. Espinosa, and A. Garcia-Fornes, “A survey of privacy in multi-agent systems,” Knowl. Eng. Rev., 2012, pp. 1–31.
[29] D. Aggarwal and A. Singh, “Software Agent Reusability Mechanism at Application Level,” Glob. J. Comput. Sci. Technol., vol. 13, no. 3, 2013, pp. 8–12.
[30] H. Hayashi, S. Tokura, F. Ozaki, and M. Doi, “Background sensing control for planning agents working in the real world.,” in Agent and Multi-Agent Systems: Technologies and Applications, 2008, pp. 11–20.
[31] K. Mivule and C. Turner, “A Review of Privacy Essentials for Confidential Mobile Data Transactions,” Int. J. Comput. Sci. Mob. Comput. ICMIC13,, no. December, 2013, pp. 36–43.
[32] A. Krause and E. Horvitz, “A Utility-Theoretic Approach to Privacy in Online Services,” J. Artif. Intell. Res., vol. 39, 2010, pp. 633–662.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Thank You!
Questions?
Contact: kmivule@gmail.com
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science

Mais conteúdo relacionado

Mais procurados

Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...ijitjournal
 
Effective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEffective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEditor IJCATR
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachIRJET Journal
 
Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device IJECEIAES
 
Multimedia mining research – an overview
Multimedia mining research – an overview  Multimedia mining research – an overview
Multimedia mining research – an overview ijcga
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14Chinmoy Ghorai
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...IJECEIAES
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems IJECEIAES
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
 
How to improve the statistical power of the 10-fold cross validation scheme i...
How to improve the statistical power of the 10-fold crossvalidation scheme i...How to improve the statistical power of the 10-fold crossvalidation scheme i...
How to improve the statistical power of the 10-fold cross validation scheme i...Andrej Kosir
 
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES_FP7
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021AIRCC Publishing Corporation
 
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesSven Wohlgemuth
 

Mais procurados (20)

Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
Effective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEffective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography Techniques
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device
 
Multimedia mining research – an overview
Multimedia mining research – an overview  Multimedia mining research – an overview
Multimedia mining research – an overview
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems
 
CV-RPLiu-2014
CV-RPLiu-2014CV-RPLiu-2014
CV-RPLiu-2014
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER Project
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
How to improve the statistical power of the 10-fold cross validation scheme i...
How to improve the statistical power of the 10-fold crossvalidation scheme i...How to improve the statistical power of the 10-fold crossvalidation scheme i...
How to improve the statistical power of the 10-fold cross validation scheme i...
 
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021
 
323462348
323462348323462348
323462348
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
 

Destaque

Diss defense
Diss defenseDiss defense
Diss defensetherob762
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense alexmessina
 
Ed s turner iii oral defense presentation - 18 feb 10
Ed s  turner iii   oral defense presentation - 18 feb 10Ed s  turner iii   oral defense presentation - 18 feb 10
Ed s turner iii oral defense presentation - 18 feb 10Dr. Ed S. Turner III
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Kato Mivule
 
Dissertation Defense Presentation
Dissertation Defense PresentationDissertation Defense Presentation
Dissertation Defense PresentationDr. Timothy Kelly
 
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...BMS Institute of Technology and Management
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentationDr. Naomi Mangatu
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpointneha47
 

Destaque (10)

Diss defense
Diss defenseDiss defense
Diss defense
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense
 
Ed s turner iii oral defense presentation - 18 feb 10
Ed s  turner iii   oral defense presentation - 18 feb 10Ed s  turner iii   oral defense presentation - 18 feb 10
Ed s turner iii oral defense presentation - 18 feb 10
 
Asim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defenseAsim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defense
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
defense_2
defense_2defense_2
defense_2
 
Dissertation Defense Presentation
Dissertation Defense PresentationDissertation Defense Presentation
Dissertation Defense Presentation
 
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 

Semelhante a Agent-based Data Privacy Engineering Framework SIED

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...Marco Balduini
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitaebutest
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSbinuvijay1
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Paul Fechtelkotter
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of thingsnajascj
 
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...Luca Berardinelli
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSbinuvijay1
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET Journal
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijwscjournal
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijdms
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxVinay Ms
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijdms
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, GermanyCharith Perera
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Universita della Calabria,
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptxishwar69
 

Semelhante a Agent-based Data Privacy Engineering Framework SIED (20)

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGS
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
 
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AI
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Introduction in IOT.pptx
Introduction in IOT.pptxIntroduction in IOT.pptx
Introduction in IOT.pptx
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 

Mais de Kato Mivule

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization Kato Mivule
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Kato Mivule
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...Kato Mivule
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyKato Mivule
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsKato Mivule
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoostKato Mivule
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierKato Mivule
 

Mais de Kato Mivule (20)

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 

Último

Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxolyaivanovalion
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Onlineanilsa9823
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 

Último (20)

Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 

Agent-based Data Privacy Engineering Framework SIED

  • 1. COGNITIVE 2014 – Venice Italy Towards Agent-based Data Privacy Engineering Kato Mivule, D.Sc. Computer Science Department Bowie State University Kato Mivule - Bowie State University Department of Computer Science Engineering Privacy Data
  • 2. Outline • Introduction • The Problem • Contributions • Methodology • Results and Discussion • Results • Discussion • Conclusion and Future work • Conclusion • Future work COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 3. Motivation • To create a systematic framework that can be followed for the data privacy engineering process. Could we have agents that autonomously implement privacy? • Given any original dataset X, a set of data privacy engineering phases should be followed from start to completion in the generation of a privatized dataset Y. Contributions • A proposed agent-based data privacy and utility engineering framework, SIED. • A proposed agent-based Privacy Parameter Mapping Heuristic. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 4. Motivation • Data Privacy Engineering – embedding legal privacy definitions in technology and governance, Kenny and Borking (2002). • Design intelligent autonomous data privacy agents. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 5. Literature Review • Wooldridge (1997): Three essential considerations (i) Agent Specifications, (ii) agent implementation, and lastly (iii) agent validation. • Wooldridge and Jennings (1999): Avoid common pitfall - the tendency to offer generic architectures for intelligent agents. • Jennings (2000): Agent based software engineering remains complex and difficult, due to the interactions between different components. • Borking and Raab (2001): called for Privacy Enhancing Technologies (PETs) from a legal perspective on technology. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 6. Literature Review • Kenny and Borking (2002): “Privacy engineering” as embedding privacy legal requirements into technological and governance blueprints. • Van Blarkom, Borking, and Olk (2003): PETs would be helpful in tackling privacy threats caused by intelligent agents that illegally disclose a user’s personal information. • Léauté and Faltings (2009): proposed an agent based privacy engineering solution using constraint satisfaction model by mapping out privacy constraints in the domain. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 7. Literature Review • Cavoukian (2011): outlined seven privacy by design principles that included: • (i) proactive, not reactive; preventative not remedial. • (ii) engineering privacy as the default. • (iii) privacy embedded into design. • (iv) full privacy functionality by avoiding needless trade-offs. • (v) end-to-end security and life cycle protection. • (vi) visibility and transparency of privacy practices. • (vii) respect for user privacy. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 8. Literature Review • Such, Espinosa, and Garcia-Fornes (2012): Privacy violations that autonomous agents engage include: • (i) secondary use, such as profiling, • (ii) identity theft • (iii) spy agents • (iv) unauthorized access • (v) traffic analysis • (vi) unauthorized dissemination of data. • Such et.al., argued: agent based privacy solutions should be incorporated in the design of information technology systems. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 9. Methodology – The Proposed SIED Data Privacy Engineering Framework • SIED phases – Specifications, Implementation, Evaluation, and Dissemination COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 10. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 11. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 12. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 13. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 14. Methodology – The Proposed SIED Data Privacy Engineering Framework – Implementation Phase: Bowie State University Department of Computer Science COGNITIVE 2014 – Venice Italy Engineering Privacy Data
  • 15. Methodology – The Proposed SIED Data Privacy Engineering Framework – Evaluation Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 16. Methodology – The Proposed SIED Data Privacy Engineering Framework – Dissemination Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 17. Methodology – The Proposed SIED Data Privacy Engineering Framework – Dissemination Phase. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 18. Methodology – Privacy Parameter Mapping Heuristic. • Categorize parameters for effective fine-tuning. •What parameters need adjustment in the data privacy process? COGNITIVE 2014 – Venice Italy CATEGORY 1 PARAMETERS CATEGORY 2 PARAMETERS CATEGORY 3 PARAMETERS Data Utility Goal Parameters: For example Accuracy, Currency, and Completeness. Data Privacy Algorithm Parameters: Values k in k-anonymity, ε in Noise addition and Differential privacy. Application Parameters (e.g. Machine Learning Classifier): For example weak learners in AdaBoost. Parameter Adjustment and Fine-tuning Trade-offs Data Privacy and Utility Preservation Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 19. Experiment Results – Non-Interactive Differential Privacy (DP) COGNITIVE 2014 – Venice Italy Data Specifications and Requirements • Used the Fisher Iris data set at the UCI repository • Contained 150 data points – multivariate • Both numeric and categorical data items • Applied vertical partitioning • Applied data privacy to only numerical data • Applied data privacy to each vertical partition • Used differential privacy as SDC method • Evaluated data utility using machine learning as a gauge • Publication of privatized data was non- interactive mode Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 20. Results – Non-Interactive Differential Privacy (DP) and Signal Processing (Filtering) COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 21. Results – Non-Interactive Differential Privacy – Non-filtered and Filtered DP Classification Error COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 22. Conclusion • An abstract view of SIED, an agent-based data privacy engineering framework has been presented. • We believe that this a contribution to the privacy-by-design challenge. • A survey of related work on agent-based software engineering and the influence on data privacy engineering, has been presented. • While SIED is proposed as a framework for agent-based data privacy engineering, it could be generalized for other non-agent- based data privacy processing as well. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 23. Conclusion • The subject of data privacy remains a challenge and more research, design, implementation, and metrics is needed to accommodate the ambiguous and fuzzy privacy requirements of individuals and entities. • We believe that intelligent agent-based architectures offer optimism for data privacy solutions. • For future works, we plan on expanding this study to take a decomposition approach in dealing with the complexity of agent- based data privacy engineering. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 24. References [1] A. Cavoukian, Privacy by Design… Take the Challenge. Information & Privacy Commissioner of Ontario, 2009. [2] A. Cavoukian, S. Taylor, and M. Abrams, “Privacy by Design: Essential for Organisational Accountability and Strong Business Practices.,” Identity Inf. Soc., vol. 3, no. 2, 2010, pp. 405–413. [3] V. G. Cerf, “Freedom and the social contract,” Commun. ACM, vol. 56, no. 9, 2013, pp. 7. [4] S. Spiekermann, “The challenges of privacy by design,” Commun. ACM, vol. 55, no. 7, Jul. 2012, pp. 38. [5] V. Katos, F. Stowell, and P. Bednar, “Surveillance , Privacy and the Law of Requisite Variety,” 2011, pp. 123–139. [6] K. Mivule, D. Josyula, and C. Turner, “An Overview of Data Privacy in Multi-Agent Learning Systems,” in the fifth COGNITIVE, 2013, no. c, pp. 14–20. [7] K. Mivule and C. Turner, “A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge,” Procedia Comput. Sci., vol. 20, 2013, pp. 414–419. [8] R. Dayarathna, “Taxonomy for Information Privacy Metrics,” J. Int. Commer. Law Technol., vol. 6, no. 4, 2011, pp. 194–206. [9] G. J. Matthews and O. Harel, “Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy,” Stat. Surv., vol. 5, 2011, pp. 1–29. [10] I. Sommerville, Software Engineering, 9th ed. Addison-Wesley, 2010, pp. 27–50. [11] G. Booch, Object Oriented Analysis & Design with Application. Santa Clara, CA: Addison-Wesley, 1994, pp. 14–20. [12] M. Wooldridge, “Agent-based software engineering,” IEE Proc. - Softw. Eng., vol. 144, no. 1, 1997, pp. 26. [13] M. J. Wooldridge and N. R. Jennings, “Software engineering with agents: Pitfalls and pratfalls.,” IEEE Internet Comput., vol. 3, no. Jun, 1999, pp. 20–27. [14] N. R. Jennings, “On agent-based software engineering,” Artif. Intell., vol. Volume 117, no. 2, 2000, pp. 277–296. [15] J. J. Borking and C. Raab, “Laws, PETs and other technologies for privacy protection.,” J. Information, Law Technol., vol. 1, 2001, pp. 1–14. [16] S. Kenny and J. Borking, “The Value of Privacy Engineering,” J. Information, Law Technol., vol. 2., no. 1, 2002. [17] G. W. Van Blarkom, J. J. Borking, and J. G. E. Olk, Handbook of privacy and privacy-enhancing technologies. The Hague: College Bescherming Persoonsgegevens, 2003, pp. 1–4. [18] F. L. y López, M. Luck, and M. D’Inverno, “A Normative Framework for Agent-Based Systems,” Comput. Math. Organ. Theory, vol. 12, no. 2–3, 2004, pp. 227–250. [19] P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, “Tropos: An agent-oriented software development methodology.,” Auton. Agent. Multi. Agent. Syst., vol. 8, no. 3, 2004, pp. 203–236. [20] F. Zambonelli and A. Omicini, “Challenges and research directions in agent-oriented software engineering,” Auton. Agent. Multi. Agent. Syst., vol. 9, no. 3, pp. 253–283. [21] S. Park and V. Sugumaran, “Designing multi-agent systems: a framework and application,” Expert Syst. Appl., vol. 28, no. 2, Feb. 2005, pp. 259–271. [22] F. Bellifemine, G. Caire, A. Poggi, and G. Rimassa, “JADE: A software framework for developing multi-agent applications. Lessons learned,” Inf. Softw. Technol., vol. 50, no. 1–2, Jan. 2008, pp. 10–21. [23] D. Weyns, H. V. D. Parunak, and O. Shehory, “The Future of Software Engineering and Multi-Agent Systems,” Int. J. Agent-Oriented Softw. Eng., vol. 3, no. 4, 2008, pp. 1–8. [24] M. Cossentino, N. Gaud, V. Hilaire, S. Galland, and A. Koukam, “ASPECS: an agent-oriented software process for engineering complex systems,” Auton. Agent. Multi. Agent. Syst., vol. 20, no. 2, Jun. 2009, pp. 260–304. [25] T. Leaute and B. Faltings, “Privacy-Preserving Multi-agent Constraint Satisfaction,” in 2009 International Conference on Computational Science and Engineering, 2009, pp. 17–25. [26] J. M. Gascueña, E. Navarro, and A. Fernández-Caballero, “Model-driven engineering techniques for the development of multi-agent systems,” Eng. Appl. Artif. Intell., vol. 25, no. 1, 2012, pp. 159–173, Feb. [27] A. Cavoukian, Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices. Office of the Information and Privacy Commissioner (2011), 2011. [28] J. M. Such, A. Espinosa, and A. Garcia-Fornes, “A survey of privacy in multi-agent systems,” Knowl. Eng. Rev., 2012, pp. 1–31. [29] D. Aggarwal and A. Singh, “Software Agent Reusability Mechanism at Application Level,” Glob. J. Comput. Sci. Technol., vol. 13, no. 3, 2013, pp. 8–12. [30] H. Hayashi, S. Tokura, F. Ozaki, and M. Doi, “Background sensing control for planning agents working in the real world.,” in Agent and Multi-Agent Systems: Technologies and Applications, 2008, pp. 11–20. [31] K. Mivule and C. Turner, “A Review of Privacy Essentials for Confidential Mobile Data Transactions,” Int. J. Comput. Sci. Mob. Comput. ICMIC13,, no. December, 2013, pp. 36–43. [32] A. Krause and E. Horvitz, “A Utility-Theoretic Approach to Privacy in Online Services,” J. Artif. Intell. Res., vol. 39, 2010, pp. 633–662. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 25. Thank You! Questions? Contact: kmivule@gmail.com COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science