2023
DOI: 10.1007/978-3-031-25734-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Privacy with Good Taste

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…A proposed response has emerged in the form of guidance, authored by cybersecurity researchers and focused on the development of privacy risk evaluation tools (26). The application of probabilistic programming to quantify indirect data leakage using tools such as "Privug" offer solutions for both privacy researchers, and data controllers, to conduct analysis in order to make informed decisions when anonymising data (27,28). In a similar fashion, a recent publication from the European Union Agency for Cybersecurity details risks associated with medical imaging data for diagnosis (29).…”
Section: Risk V Utilitymentioning
confidence: 99%
“…A proposed response has emerged in the form of guidance, authored by cybersecurity researchers and focused on the development of privacy risk evaluation tools (26). The application of probabilistic programming to quantify indirect data leakage using tools such as "Privug" offer solutions for both privacy researchers, and data controllers, to conduct analysis in order to make informed decisions when anonymising data (27,28). In a similar fashion, a recent publication from the European Union Agency for Cybersecurity details risks associated with medical imaging data for diagnosis (29).…”
Section: Risk V Utilitymentioning
confidence: 99%