Semantic Filter
show all semantic filters
Found 9 articles
  • A privacy-preserving decentralized credit scoring method based on multi-party information

    PDF

    2023 | Decision Support Systems | Citations: 0

    Authors: He, Haoran; Wang, Zhao; Jain, Hemant; Jiang, Cuiqing; Yang, Shanlin

    Abstract: With society's wide-scale adoption of information technology, significant inform ... Expand

    Semantic filters: homomorphic encryption

    Topics: privacy homomorphic encryption logistics management online lending missing data

    Methods: computational algorithm machine learning federated learning logistic regression experiment

  • Business model implications of privacy-preserving technologies in data marketplaces: The case of multi-party computation

    2021 | European Conference On Information Systems | Citations: 0

    Authors: Agahari, Wirawan; Dolci, Riccardo; Reuver, Mark de

    Abstract: Privacy-preserving technologies could allow data marketplaces to deliver techni ... Expand

    Semantic filters: homomorphic encryption

    Topics: privacy business model value creation peer-to-peer model digital platform

    Methods: qualitative interview qualitative coding design artifact archival research experiment

  • Anonymous Blockchain-based System for Consortium

    PDF

    2021 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Wang, Qin; Chen, Shiping; Xiang, Yang

    Abstract: Blockchain records transactions with various protection techniques against tampe ... Expand

    Semantic filters: homomorphic encryption

    Topics: anonymity data encryption public key encryption blockchain privacy

    Methods: computational algorithm experiment design artifact literature study simulation

  • PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data

    PDF

    2020 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Mehrotra, Sharad; Sharma, Shantanu; Ullman, Jeffrey D.; Ghosh, Dhrubajyoti; Gupta, Peeyush; Mishra, Anurag

    Abstract: Despite extensive research on cryptography, secure and efficient query processin ... Expand

    Semantic filters: homomorphic encryption

    Topics: data security data encryption cloud computing data breach outsourcing

    Methods: computational algorithm design artifact experiment

  • A Novel Group Ownership Delegate Protocol for RFID Systems

    PDF

    2019 | Information Systems Frontiers | Citations: 9

    Authors: Lee, Cheng-Chi; Li, Chun-Ta; Cheng, Chung-Lun; Lai, Yan-Ming; Vasilakos, Athanasios V.

    Abstract: In recent years, Radio Frequency Identification (RFID) applications of various k ... Expand

    Semantic filters: homomorphic encryption

    Topics: electronic authentication radio frequency identification homomorphic encryption authorization privacy

    Methods: literature study

  • Privacy-preserving Distributed Analytics: Addressing the Privacy-Utility Tradeoff Using Homomorphic Encryption for Peer-to-Peer Analytics

    2015 | International Conference on Information Systems | Citations: 0

    Authors: Bhattacharya, Prasanta; Phan, Tuan; Liu, Linlin

    Abstract: Data is becoming increasingly valuable, but concerns over its security and priva ... Expand

    Semantic filters: homomorphic encryption

    Topics: data encryption privacy public key encryption peer-to-peer model homomorphic encryption

    Methods: logistic regression simulation design artifact conceptual modelling design science

  • Confidential Information-Sharing for Automated Sustainability Benchmarks

    2011 | International Conference on Information Systems | Citations: 0

    Authors: Kerschbaum, Florian; StrÃ, Jens

    Abstract: The pressure on enterprises to manage and improve their environmental sustainabi ... Expand

    Semantic filters: homomorphic encryption

    Topics: data encryption supply chain management enterprise resource planning homomorphic encryption public key encryption

    Methods: design artifact experiment company material computational algorithm data envelopment analysis

  • Secure and Sustainable Benchmarking in Clouds: A Multi-Party Cloud Application with an Untrusted Service Provider

    PDF

    2011 | Business & Information Systems Engineering | Citations: 0

    Authors: Kerschbaum, Florian

    Abstract: Cloud computing entails a novel security threat: The cloud service provider is ... Expand

    Semantic filters: homomorphic encryption

    Topics: cloud computing homomorphic encryption Java data encryption web service

    Methods: experiment cluster analysis computational algorithm time series analysis longitudinal research

  • Voting Early and Often Can Be a Good Thing

    2007 | Americas Conference on Information Systems | Citations: 0

    Authors: Post, Gerald

    Abstract: The current political climate has almost ruled out the use of Internet voting. M ... Expand

    Semantic filters: homomorphic encryption

    Topics: spyware homomorphic encryption