SlideShare a Scribd company logo
1 of 24
Download to read offline
An Overview of Data Privacy in Multi-Agent Learning Systems
Kato Mivule, Darsana Josyula, and Claude Turner
Computer Science Department
Bowie State University
Bowie, Maryland, USA
COGNITIVE 2013
1
OUTLINE
• Introduction
• Literature Review
• Privacy Issues in Multi-agents
• Proposed Abstract Privacy Architectures
• Work in Progress
• Conclusion
2
COGNITIVE 2013
3
COGNITIVE 2013
This an
overview of
data privacy in
multi-agent
systems,
challenges and
future areas of
work.
Need to engineer
multi-agent
systems that
comply with data
privacy laws.
Entities have to
comply to data
privacy laws.
There are data
privacy challenges
that multi-agents
must encounter.
INTRODUCTION
4
COGNITIVE 2013
MOTIVATION
• Design and develop multi-agent learning systems that take into account
data privacy considerations.
LITERATURE REVIEW
5
COGNITIVE 2013
Research
Interest
• Privacy in multi-agent systems has been of research interest for some time.
Forner
(1996):
• Privacy in multi-agents was still problematic due to privacy design challenges.
Wong et al.
(2000)
• Security and trust in multi-agent systems was problematic; proposed a security
and trust architecture, agents self-authenticate.
Yu et al.
(2003)
• Privacy may have various meanings and importance for different agents; there
should be room for a diversity of perceptions on privacy.
Ramchurn et al.
(2004):
Three problematic
areas of trust in multi-
agent systems.
(i) Multi-agent
interactions.
(ii) Multi-agent
interrelation.
(iii) Multi-agent
cooperation.
6
COGNITIVE 2013
LITERATURE REVIEW
LITERATURE REVIEW – MULTI-AGENTS
7
COGNITIVE 2013
Jung et al.
(2012):
• Critical to autonomous computing; Security and Trust issues
need to be addressed.
Martins et al.
(2012):
• Need to conform to the three canons of privacy and security,
namely, Confidentiality, Accessibility, and Integrity.
Nagaraj
(2012):
• Privacy and security Requirements for multi-agents, is often
neglected during the Requirements design phase.
THE PROBLEM: DEFINING PRIVACY
Friedewald et al.
(2010):
Privacy is an evolving
and shifting complex
multi-layered concept,
described differently by
different people.
Katos et al. (2011):
Privacy is a human and
socially driven
distinctive made up of
human mannerisms,
perceptions, and
opinions.
Spiekermann (2012):
Privacy is a fuzzy
concept often confused
with security, and, as
such, difficult to
implement.
A concise definition
of privacy is
problematic.
8
COGNITIVE 2013
Data utility:
How useful a privatized
dataset is to the user of
that particular
privatized dataset.
Faces same definition
challenges as data
privacy.
BACKGROUND – DEFINING PRIVACY IN MULTI-AGENTS
Agents: Wooldridge
(2003):
Computer systems
that are located in a
particular
environment with the
capability of
independent and
autonomous action
so as to achieve
intended specific
goals.
Multi-Agents:
Wooldridge (2003):
A group of
autonomous agents
combined into one
system,
independently
solving simpler
problems while
communicating with
each other to
accomplish bigger
and complex
objectives.
Multi-agent systems
(MAS): Da Silva
(2005):
Multi-agent systems
are formed to deal
with complex
applications in a
distributed systems
environment.
Privacy and Security
Issues: Da Silva
(2005):
Observed that
examining data in
distributed
environments is a
difficult problem
since agents face
several restrictions
that include privacy
issues with sensitive
data.
9
COGNITIVE 2013
Data privacy and security:
Pfleeger et al. (2006):
Privacy:
A controlled disclosure in
which an entity decides when
and to whom to disclose its
data.
Security:
Has to do with access
control, as in who is allowed
legitimate access to data and
systems.
10
COGNITIVE 2013
BACKGROUND – UNDERLYING PRIVACY NOTIONS
11
COGNITIVE 2013
BACKGROUND - UNDERLYING PRIVACY NOTIONS
The three aspects of
information security
Pfleeger et al. (2006):
Confidentiality:
Ensuring the
concealment and privacy
of data and systems,
Availability:
Ensuring the availability
of data and systems at
all times, and lastly,
Integrity:
Ensuring that data and
systems are altered by
only the authorized.
Such et al. (2012):
Multi-agents are
vulnerable to three
information-related
activities:
Information
collection:
agents collect and
store data about an
individual.
Information
processing:
whereby agents
modify data that has
been collected.
Information
dissemination:
whereby agents
publish data.
12
COGNITIVE 2013
PRIVACY ISSUES IN MULTI-AGENT SYSTEMS
Klusch et al. (2003):
• Autonomy and
privacy of agents in a
distributed
environment.
Albashiri (2010):
• Multi heterogeneous
agent systems, have
to specify suitable
communication and
interfacing
protocols.
13
COGNITIVE 2013
PRIVACY ISSUES IN MULTI-AGENT SYSTEMS
Rashvand et al., (2010):
Multi-agent security
requirements :
Service-agent
protection:
agents are protected
from external threats.
System vulnerability:
agents are protected
from insecure internal
processes.
Protective security
services:
main goal of an agent is
to provide security.
14
COGNITIVE 2013
PRIVACY ISSUES IN MULTI-AGENT SYSTEMS
Nagaraj (2012):
• Agent
misbehavior
(e.g., denial of
service attacks).
Martins et al.,
(2012):
• Key security
concerns of
Authentication,
Confidentiality,
and Integrity
must be taken
into considered.
Krupa et al. (2012):
• ‘Privacy
Enforcing Norms’
in which agents
learn a set of
acceptable
privacy social
behavior(rules).
• Penalties given to
agents that
misbehave.
15
COGNITIVE 2013
PRIVACY ISSUES IN MULTI-AGENT SYSTEMS
Krupa (2012):
Implementing
privacy for agents is
still problematic:
Agents have to
learn how to sense
privacy violations.
Managing multi-
agents without
centralization to
deter privacy
abuses.
Flexible solutions
to the
inapplicability of
most existing
privacy algorithms.
16
COGNITIVE 2013
AN ABSTRACT ARCHITECTURE FOR PRIVACY PRESERVING MULTI-AGENT SYSTEM
17
COGNITIVE 2013
AN ABSTRACT ARCHITECTURE FOR PRIVACY PRESERVING MULTI-AGENT SYSTEM
18
COGNITIVE 2013
AN ABSTRACT ARCHITECTURE FOR PRIVACY PRESERVING MULTI-AGENT SYSTEM
19
COGNITIVE 2013
AN ABSTRACT ARCHITECTURE FOR PRIVACY PRESERVING MULTI-AGENT SYSTEM
20
COGNITIVE 2013
THE UNDERLYING CHALLENGES OF DATA PRIVACY AND UTILITY STILL IMPACT PRIVACY DESIGN IN MULTI-AGENTS
21
COGNITIVE 2013
• Trade-offs between privacy and utility are sought.
• The problem of data privacy in multi-agents still remains a challenge.
REFERENCES
M. Wooldridge, “An Introduction to Multi-Agent Systems.” Chichester, England: John Wiley and Sons, 2003, ISBN-10: 0470519460.
J.C. Da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch, “Distributed data mining and agents”, Eng Appl Artif Intell, pages 791–807, 2005.
K.A. Albashiri, “An investigation into the issues of Multi-Agent Data Mining”, Dissertation, University of Liverpool, 2010
A.L. Samuel, “Some studies in machine learning using the game of checkers”. IBM Journal. Res. Dev. 3, 3, pages 210-229, 1959. DOI=10.1147/rd.33.0210
T. Mitchell, “ Machine Learning”, McGraw Hill. ISBN 0-07-042807-7, page 2, 1997.
IBM, “Big Data”, Online, [Retrieved: March, 2013] http://www-01.ibm.com/software/data/bigdata/
W. Davies, “Agent-Based Data-Mining”, First Year Report, University, 15 August 1994, Online, [Retrieved: March 2013]
http://www.agent.ai/doc/upload/200403/davi94_1.pdf
C.P. Pfleeger and S.L. Pfleeger, “Security in Computing” (4th Edition). Prentice Hall PTR, Upper Saddle River, NJ, USA, pages 10, 606, 2006.
US Department of Homeland Security, “Handbook for Safeguarding Sensitive Personally Identifiable Information at The Department of Homeland Security”, October
2008. Online, [Retrieved February, 2013] http://www.dhs.gov/xlibrary/assets/privacy/privacy_guide_spii_handbook.pdf
E. Mccallister, and K. Scarfone, “Guide to Protecting the Confidentiality of Personally Identifiable Information ( PII ) Recommendations of the National Institute of
Standards and Technology”, NIST Special Publication 800-122, 2010.
V. Rastogi, S. Hong, and D. Suciu, “The boundary between privacy and utility in data publishing”, VLDB, September pp. 531-542, 2007.
M. Sramka, R. Safavi-Naini, J. Denzinger, and M. Askari, “A Practice-oriented Framework for Measuring Privacy and Utility in Data Sanitization Systems”, ACM, (EDBT’ 10)
Article 27, 10 pages, 2010. DOI=10.1145/1754239.1754270
S.R. Sankar, “Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information”, Information Theory and Applications Workshop (ITA), pages 1-7,
2010 .
R.C. Wong, et al, “Minimality attack in privacy preserving data publishing.” VLDB, pages 543-554, 2007.
W. Davies, and P. Edwards, “Distributed learning: An agent-based approach to data-mining”. In working notes of ICML'95, Workshop on Agents that Learn from Other
Agents, 1995.
D. Caragea, A. Silvescu, and V. Honavar, “Agents that learn from distributed and dynamic data sources.” In Proceedings of the Workshop on Learning Agents, pages 53-
61, 2000.
S. Ontañón, and E. Plaza, “Recycling data for multi-agent learning”. In Proceedings of the 22nd international conference on Machine learning (ICML '05). ACM, pages
633-640, 2005.
R. Cissée, “An architecture for agent-based privacy-preserving information filtering." In Proceedings of 6th International Workshop on Trust, Privacy, Deception and
Fraud in Agent Systems, 2003.
L. Crepin, Y. Demazeau, O. Boissier, and F. Jacquenet, "Sensitive data transaction in Hippocratic multi-agent systems." Engineering Societies in the Agents World IX, pages
85-101, 2009.
22
COGNITIVE 2013
REFERENCES
T. Léauté, and B. Faltings, “Privacy-Preserving Multi-agent Constraint Satisfaction”, International Conference on Computational Science and Engineering, Vol. 3, pages
17-25, 2009.
JM. Such, A. Espinosa, A. GarcíA-Fornes, and C. Sierra, "Self-disclosure decision making based on intimacy and privacy." Journal of Information Sciences Vol 211, 2012,
pages 93-111.
JM. Such, A. Espinosa, A. GarcíA-Fornes, and C. Sierra, “A Survey of Privacy in Multi-agent Systems”, Knowledge Engineering Review, in press, 2012.
M. Klusch, S. Lodi, and G. Moro, “Issues of agent-based distributed data mining.”, In Proceedings of the second international joint conference on Autonomous agents and
multiagent systems, ACM, pages 1034-1035, 2003, DOI=10.1145/860575.860782
H.F. Rashvand, K. Salah, J.M.A Calero, L. Harn: “Distributed security for multi-agent systems - review and applications”. IET Inf. Secur. 4(4), pages 188–201, 2012.
S. V. Nagaraj, "Securing Multi-agent Systems: A Survey." Advances in Computing and Information Technology, pages 23-30, 2012.
R.A. Martins, M.E. Correia, and A.B. Augusto, "A literature review of security mechanisms employed by mobile agents," Information Systems and Technologies (CISTI), 7th
Iberian Conference, pages 1-4, 2012.
Y. Krupa and L. Vercouter "Handling privacy as contextual integrity in decentralized virtual communities: The PrivaCIAS framework." Web Intelligence and Agent Systems,
pages 105-116, 2012.
Y. Krupa, "PrivaCIAS: Privacy as Contextual Integrity in Decentralized Multi-Agent Systems." PhD dissertation, Université de Caen, 2012.
S. Chakraborty, Z. Charbiwala, H. Choi, KR. Raghavan, and MB. Srivastava, "Balancing behavioral privacy and information utility in sensory data flows." Pervasive and
Mobile Computing, Volume 8, Issue 3, Pages 331–345 2012.
C. Dwork, “Differential Privacy”, Automata, Languages and Programming, Lecture Notes in Computer Science, Springer, Vol. 4052, pages 1-12, 2006.
V. Ciriani, S.D. Di Vimercati, S. Foresti, and P. Samarati, “Theory of privacy and anonymity”. In Algorithms and theory of computation handbook (2 ed.), pages 18-18,
Chapman and Hall/CRC, 2010, ISBN:978-1-58488-820-8.
P. Samarati and L. Sweeney, “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression”, IEEE Symp on
Research in Security and Privacy, pp. 384–393, 1998.
US Federal Election Comission, Campaign Finance Disclosure Portal, Online, [Retrieved: March 2013] http://www.fec.gov/pindex.shtml
L.N. Foner, "A security architecture for multi-agent matchmaking." In Proceeding of Second International Conference on Multi-Agent System, Mario Tokoro. Pages 80-86,
1996.
C.H. Wong, and K. Sycara. "Adding security and trust to multiagent systems." Applied Artificial Intelligence Vol. 14, no. 9, pages 927-941, 2002.
E. Yu, and L. Cysneiros. "Designing for Privacy in a Multi-agent World." Trust, Reputation, and Security: Theories and Practice, pages: 259-269, 2003.
S.D. Ramchurn, D. Huynh, and N.R. Jennings. "Trust in multi-agent systems." The Knowledge Engineering Review Vol. 19, no. 1, pages 1-25, 2004.
Y. Jung, M. Kim, A. Masoumzadeh, and J.BD. Joshi. "A survey of security issue in multi-agent systems." Artificial Intelligence Review, Vol. 37, no. 3, pages 239-260, 2012.
R.A. Martins, M.E. Correia, and A.B. Augusto, "A literature review of security mechanisms employed by mobile agents," 7th Iberian Conference on Information Systems
and Technologies (CISTI), pages1-4, 2012.
V. Katos, F. Stowell, and P. Bednar, “Surveillance, Privacy and the Law of Requisite Variety”, Data Privacy Management and Autonomous Spontaneous Security, Lecture
Notes in Computer Science Vol. 6514, pages 123–139, 2011.
S. Spiekermann, “The challenges of privacy by design,” Communications of the ACM, vol. 55, no. 7, page 38, 2012.
M. Friedewald, D. Wright, S. Gutwirth, and E. Mordini, “Privacy, data protection and emerging sciences and technologies: towards a common framework,” Innovation:
The European Journal of Social Science Research, vol. 23, no. 1, pp. 61–67, Mar. 2010.
23
COGNITIVE 2013
THANK YOU.
Contact: kmivule at gmail dot com
24
COGNITIVE 2013

More Related Content

What's hot

A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishingijcisjournal
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
A survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsA survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsunyil96
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataIOSR Journals
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
78201919
7820191978201919
78201919IJRAT
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Rule-based Information Extraction from Disease Outbreak Reports
Rule-based Information Extraction from Disease Outbreak ReportsRule-based Information Extraction from Disease Outbreak Reports
Rule-based Information Extraction from Disease Outbreak ReportsWaqas Tariq
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Data Mining: Investment risk in the bank
Data Mining: Investment risk in the bankData Mining: Investment risk in the bank
Data Mining: Investment risk in the bankEditor IJCATR
 
Advanced SQL
Advanced SQLAdvanced SQL
Advanced SQLSabiha M
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysisAlexander Decker
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Thomas
ThomasThomas
Thomasanesah
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks IJECEIAES
 

What's hot (19)

A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
A survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsA survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methods
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
78201919
7820191978201919
78201919
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Rule-based Information Extraction from Disease Outbreak Reports
Rule-based Information Extraction from Disease Outbreak ReportsRule-based Information Extraction from Disease Outbreak Reports
Rule-based Information Extraction from Disease Outbreak Reports
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Data Mining: Investment risk in the bank
Data Mining: Investment risk in the bankData Mining: Investment risk in the bank
Data Mining: Investment risk in the bank
 
Advanced SQL
Advanced SQLAdvanced SQL
Advanced SQL
 
CV-krist
CV-kristCV-krist
CV-krist
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Thomas
ThomasThomas
Thomas
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 

Viewers also liked

Open source software to assist lower socio economic
Open source software to assist lower socio economicOpen source software to assist lower socio economic
Open source software to assist lower socio economicMaurice Dawson
 
Legio xiii vs panthers parma : american football teams -business communication
Legio xiii vs panthers parma : american football teams -business communicationLegio xiii vs panthers parma : american football teams -business communication
Legio xiii vs panthers parma : american football teams -business communicationvalerio italia
 
Cartel curso defensa policial contra arma blanca 2014
Cartel curso defensa policial contra arma blanca 2014Cartel curso defensa policial contra arma blanca 2014
Cartel curso defensa policial contra arma blanca 2014Jose Martin Sosa Granados
 
Musica & Mercado Revista #18
Musica & Mercado Revista #18Musica & Mercado Revista #18
Musica & Mercado Revista #18Música & Mercado
 
Sistemas de financiación y gestión presupuestaria
Sistemas de financiación y gestión presupuestariaSistemas de financiación y gestión presupuestaria
Sistemas de financiación y gestión presupuestariambformacion
 
Catalogue Sản phẩm Cassida
Catalogue Sản phẩm CassidaCatalogue Sản phẩm Cassida
Catalogue Sản phẩm CassidaĐỗ Bá Tùng
 
Servifone - IV Negocio Abierto Provincial CIT Marbella
Servifone - IV Negocio Abierto Provincial CIT MarbellaServifone - IV Negocio Abierto Provincial CIT Marbella
Servifone - IV Negocio Abierto Provincial CIT MarbellaCIT Marbella
 
Supporting the Digital Scholar: Experiences from the British Library Labs
Supporting the Digital Scholar:Experiences from the British Library LabsSupporting the Digital Scholar:Experiences from the British Library Labs
Supporting the Digital Scholar: Experiences from the British Library Labslabsbl
 
La canica ingravida (recuperacion) camilo coral
La canica ingravida (recuperacion) camilo coralLa canica ingravida (recuperacion) camilo coral
La canica ingravida (recuperacion) camilo coralcamiloroblesc
 
Presentación Máster en Dirección de Producción
Presentación Máster en Dirección de ProducciónPresentación Máster en Dirección de Producción
Presentación Máster en Dirección de ProducciónJavier Santos
 
Design deiservizicollaborativi danielaselloni_sharingschool
Design deiservizicollaborativi danielaselloni_sharingschoolDesign deiservizicollaborativi danielaselloni_sharingschool
Design deiservizicollaborativi danielaselloni_sharingschoolDaniela Selloni
 
SOLID -Clean Code For Mere Mortals
SOLID -Clean Code For Mere MortalsSOLID -Clean Code For Mere Mortals
SOLID -Clean Code For Mere MortalsWekoslav Stefanovski
 

Viewers also liked (20)

Open source software to assist lower socio economic
Open source software to assist lower socio economicOpen source software to assist lower socio economic
Open source software to assist lower socio economic
 
Legio xiii vs panthers parma : american football teams -business communication
Legio xiii vs panthers parma : american football teams -business communicationLegio xiii vs panthers parma : american football teams -business communication
Legio xiii vs panthers parma : american football teams -business communication
 
Yolimar
YolimarYolimar
Yolimar
 
Cartel curso defensa policial contra arma blanca 2014
Cartel curso defensa policial contra arma blanca 2014Cartel curso defensa policial contra arma blanca 2014
Cartel curso defensa policial contra arma blanca 2014
 
Feliz navidad prospero_2014
Feliz navidad prospero_2014Feliz navidad prospero_2014
Feliz navidad prospero_2014
 
Musica & Mercado Revista #18
Musica & Mercado Revista #18Musica & Mercado Revista #18
Musica & Mercado Revista #18
 
Bulling
BullingBulling
Bulling
 
Sistemas de financiación y gestión presupuestaria
Sistemas de financiación y gestión presupuestariaSistemas de financiación y gestión presupuestaria
Sistemas de financiación y gestión presupuestaria
 
Fax machine3
Fax machine3Fax machine3
Fax machine3
 
Programa de intercambio de estudiantes del consorcio para la colaboración en ...
Programa de intercambio de estudiantes del consorcio para la colaboración en ...Programa de intercambio de estudiantes del consorcio para la colaboración en ...
Programa de intercambio de estudiantes del consorcio para la colaboración en ...
 
Catalogue Sản phẩm Cassida
Catalogue Sản phẩm CassidaCatalogue Sản phẩm Cassida
Catalogue Sản phẩm Cassida
 
Servifone - IV Negocio Abierto Provincial CIT Marbella
Servifone - IV Negocio Abierto Provincial CIT MarbellaServifone - IV Negocio Abierto Provincial CIT Marbella
Servifone - IV Negocio Abierto Provincial CIT Marbella
 
Supporting the Digital Scholar: Experiences from the British Library Labs
Supporting the Digital Scholar:Experiences from the British Library LabsSupporting the Digital Scholar:Experiences from the British Library Labs
Supporting the Digital Scholar: Experiences from the British Library Labs
 
La canica ingravida (recuperacion) camilo coral
La canica ingravida (recuperacion) camilo coralLa canica ingravida (recuperacion) camilo coral
La canica ingravida (recuperacion) camilo coral
 
Pac Buzz - August 2015
Pac Buzz - August 2015Pac Buzz - August 2015
Pac Buzz - August 2015
 
Sida(6)(A)
Sida(6)(A)Sida(6)(A)
Sida(6)(A)
 
Presentación Máster en Dirección de Producción
Presentación Máster en Dirección de ProducciónPresentación Máster en Dirección de Producción
Presentación Máster en Dirección de Producción
 
Design deiservizicollaborativi danielaselloni_sharingschool
Design deiservizicollaborativi danielaselloni_sharingschoolDesign deiservizicollaborativi danielaselloni_sharingschool
Design deiservizicollaborativi danielaselloni_sharingschool
 
SOLID -Clean Code For Mere Mortals
SOLID -Clean Code For Mere MortalsSOLID -Clean Code For Mere Mortals
SOLID -Clean Code For Mere Mortals
 
Métodos de diagnostico
Métodos de diagnosticoMétodos de diagnostico
Métodos de diagnostico
 

Similar to Data Privacy Challenges in Multi-Agent Learning

Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...CREST @ University of Adelaide
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...David Doret
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...CREST @ University of Adelaide
 
78201919
7820191978201919
78201919IJRAT
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...ijseajournal
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of ThingsDeris Stiawan
 
PUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSPUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSVy Quoc Tran
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengedmcmenemy
 

Similar to Data Privacy Challenges in Multi-Agent Learning (20)

Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
 
78201919
7820191978201919
78201919
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
PUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSPUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESS
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 

More from Kato Mivule

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization Kato Mivule
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Kato Mivule
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsKato Mivule
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Kato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoostKato Mivule
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierKato Mivule
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...Kato Mivule
 

More from Kato Mivule (20)

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Data Privacy Challenges in Multi-Agent Learning

  • 1. An Overview of Data Privacy in Multi-Agent Learning Systems Kato Mivule, Darsana Josyula, and Claude Turner Computer Science Department Bowie State University Bowie, Maryland, USA COGNITIVE 2013 1
  • 2. OUTLINE • Introduction • Literature Review • Privacy Issues in Multi-agents • Proposed Abstract Privacy Architectures • Work in Progress • Conclusion 2 COGNITIVE 2013
  • 3. 3 COGNITIVE 2013 This an overview of data privacy in multi-agent systems, challenges and future areas of work. Need to engineer multi-agent systems that comply with data privacy laws. Entities have to comply to data privacy laws. There are data privacy challenges that multi-agents must encounter. INTRODUCTION
  • 4. 4 COGNITIVE 2013 MOTIVATION • Design and develop multi-agent learning systems that take into account data privacy considerations.
  • 5. LITERATURE REVIEW 5 COGNITIVE 2013 Research Interest • Privacy in multi-agent systems has been of research interest for some time. Forner (1996): • Privacy in multi-agents was still problematic due to privacy design challenges. Wong et al. (2000) • Security and trust in multi-agent systems was problematic; proposed a security and trust architecture, agents self-authenticate. Yu et al. (2003) • Privacy may have various meanings and importance for different agents; there should be room for a diversity of perceptions on privacy.
  • 6. Ramchurn et al. (2004): Three problematic areas of trust in multi- agent systems. (i) Multi-agent interactions. (ii) Multi-agent interrelation. (iii) Multi-agent cooperation. 6 COGNITIVE 2013 LITERATURE REVIEW
  • 7. LITERATURE REVIEW – MULTI-AGENTS 7 COGNITIVE 2013 Jung et al. (2012): • Critical to autonomous computing; Security and Trust issues need to be addressed. Martins et al. (2012): • Need to conform to the three canons of privacy and security, namely, Confidentiality, Accessibility, and Integrity. Nagaraj (2012): • Privacy and security Requirements for multi-agents, is often neglected during the Requirements design phase.
  • 8. THE PROBLEM: DEFINING PRIVACY Friedewald et al. (2010): Privacy is an evolving and shifting complex multi-layered concept, described differently by different people. Katos et al. (2011): Privacy is a human and socially driven distinctive made up of human mannerisms, perceptions, and opinions. Spiekermann (2012): Privacy is a fuzzy concept often confused with security, and, as such, difficult to implement. A concise definition of privacy is problematic. 8 COGNITIVE 2013 Data utility: How useful a privatized dataset is to the user of that particular privatized dataset. Faces same definition challenges as data privacy.
  • 9. BACKGROUND – DEFINING PRIVACY IN MULTI-AGENTS Agents: Wooldridge (2003): Computer systems that are located in a particular environment with the capability of independent and autonomous action so as to achieve intended specific goals. Multi-Agents: Wooldridge (2003): A group of autonomous agents combined into one system, independently solving simpler problems while communicating with each other to accomplish bigger and complex objectives. Multi-agent systems (MAS): Da Silva (2005): Multi-agent systems are formed to deal with complex applications in a distributed systems environment. Privacy and Security Issues: Da Silva (2005): Observed that examining data in distributed environments is a difficult problem since agents face several restrictions that include privacy issues with sensitive data. 9 COGNITIVE 2013
  • 10. Data privacy and security: Pfleeger et al. (2006): Privacy: A controlled disclosure in which an entity decides when and to whom to disclose its data. Security: Has to do with access control, as in who is allowed legitimate access to data and systems. 10 COGNITIVE 2013 BACKGROUND – UNDERLYING PRIVACY NOTIONS
  • 11. 11 COGNITIVE 2013 BACKGROUND - UNDERLYING PRIVACY NOTIONS The three aspects of information security Pfleeger et al. (2006): Confidentiality: Ensuring the concealment and privacy of data and systems, Availability: Ensuring the availability of data and systems at all times, and lastly, Integrity: Ensuring that data and systems are altered by only the authorized.
  • 12. Such et al. (2012): Multi-agents are vulnerable to three information-related activities: Information collection: agents collect and store data about an individual. Information processing: whereby agents modify data that has been collected. Information dissemination: whereby agents publish data. 12 COGNITIVE 2013 PRIVACY ISSUES IN MULTI-AGENT SYSTEMS
  • 13. Klusch et al. (2003): • Autonomy and privacy of agents in a distributed environment. Albashiri (2010): • Multi heterogeneous agent systems, have to specify suitable communication and interfacing protocols. 13 COGNITIVE 2013 PRIVACY ISSUES IN MULTI-AGENT SYSTEMS
  • 14. Rashvand et al., (2010): Multi-agent security requirements : Service-agent protection: agents are protected from external threats. System vulnerability: agents are protected from insecure internal processes. Protective security services: main goal of an agent is to provide security. 14 COGNITIVE 2013 PRIVACY ISSUES IN MULTI-AGENT SYSTEMS
  • 15. Nagaraj (2012): • Agent misbehavior (e.g., denial of service attacks). Martins et al., (2012): • Key security concerns of Authentication, Confidentiality, and Integrity must be taken into considered. Krupa et al. (2012): • ‘Privacy Enforcing Norms’ in which agents learn a set of acceptable privacy social behavior(rules). • Penalties given to agents that misbehave. 15 COGNITIVE 2013 PRIVACY ISSUES IN MULTI-AGENT SYSTEMS
  • 16. Krupa (2012): Implementing privacy for agents is still problematic: Agents have to learn how to sense privacy violations. Managing multi- agents without centralization to deter privacy abuses. Flexible solutions to the inapplicability of most existing privacy algorithms. 16 COGNITIVE 2013
  • 17. AN ABSTRACT ARCHITECTURE FOR PRIVACY PRESERVING MULTI-AGENT SYSTEM 17 COGNITIVE 2013
  • 18. AN ABSTRACT ARCHITECTURE FOR PRIVACY PRESERVING MULTI-AGENT SYSTEM 18 COGNITIVE 2013
  • 19. AN ABSTRACT ARCHITECTURE FOR PRIVACY PRESERVING MULTI-AGENT SYSTEM 19 COGNITIVE 2013
  • 20. AN ABSTRACT ARCHITECTURE FOR PRIVACY PRESERVING MULTI-AGENT SYSTEM 20 COGNITIVE 2013
  • 21. THE UNDERLYING CHALLENGES OF DATA PRIVACY AND UTILITY STILL IMPACT PRIVACY DESIGN IN MULTI-AGENTS 21 COGNITIVE 2013 • Trade-offs between privacy and utility are sought. • The problem of data privacy in multi-agents still remains a challenge.
  • 22. REFERENCES M. Wooldridge, “An Introduction to Multi-Agent Systems.” Chichester, England: John Wiley and Sons, 2003, ISBN-10: 0470519460. J.C. Da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch, “Distributed data mining and agents”, Eng Appl Artif Intell, pages 791–807, 2005. K.A. Albashiri, “An investigation into the issues of Multi-Agent Data Mining”, Dissertation, University of Liverpool, 2010 A.L. Samuel, “Some studies in machine learning using the game of checkers”. IBM Journal. Res. Dev. 3, 3, pages 210-229, 1959. DOI=10.1147/rd.33.0210 T. Mitchell, “ Machine Learning”, McGraw Hill. ISBN 0-07-042807-7, page 2, 1997. IBM, “Big Data”, Online, [Retrieved: March, 2013] http://www-01.ibm.com/software/data/bigdata/ W. Davies, “Agent-Based Data-Mining”, First Year Report, University, 15 August 1994, Online, [Retrieved: March 2013] http://www.agent.ai/doc/upload/200403/davi94_1.pdf C.P. Pfleeger and S.L. Pfleeger, “Security in Computing” (4th Edition). Prentice Hall PTR, Upper Saddle River, NJ, USA, pages 10, 606, 2006. US Department of Homeland Security, “Handbook for Safeguarding Sensitive Personally Identifiable Information at The Department of Homeland Security”, October 2008. Online, [Retrieved February, 2013] http://www.dhs.gov/xlibrary/assets/privacy/privacy_guide_spii_handbook.pdf E. Mccallister, and K. Scarfone, “Guide to Protecting the Confidentiality of Personally Identifiable Information ( PII ) Recommendations of the National Institute of Standards and Technology”, NIST Special Publication 800-122, 2010. V. Rastogi, S. Hong, and D. Suciu, “The boundary between privacy and utility in data publishing”, VLDB, September pp. 531-542, 2007. M. Sramka, R. Safavi-Naini, J. Denzinger, and M. Askari, “A Practice-oriented Framework for Measuring Privacy and Utility in Data Sanitization Systems”, ACM, (EDBT’ 10) Article 27, 10 pages, 2010. DOI=10.1145/1754239.1754270 S.R. Sankar, “Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information”, Information Theory and Applications Workshop (ITA), pages 1-7, 2010 . R.C. Wong, et al, “Minimality attack in privacy preserving data publishing.” VLDB, pages 543-554, 2007. W. Davies, and P. Edwards, “Distributed learning: An agent-based approach to data-mining”. In working notes of ICML'95, Workshop on Agents that Learn from Other Agents, 1995. D. Caragea, A. Silvescu, and V. Honavar, “Agents that learn from distributed and dynamic data sources.” In Proceedings of the Workshop on Learning Agents, pages 53- 61, 2000. S. Ontañón, and E. Plaza, “Recycling data for multi-agent learning”. In Proceedings of the 22nd international conference on Machine learning (ICML '05). ACM, pages 633-640, 2005. R. Cissée, “An architecture for agent-based privacy-preserving information filtering." In Proceedings of 6th International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems, 2003. L. Crepin, Y. Demazeau, O. Boissier, and F. Jacquenet, "Sensitive data transaction in Hippocratic multi-agent systems." Engineering Societies in the Agents World IX, pages 85-101, 2009. 22 COGNITIVE 2013
  • 23. REFERENCES T. Léauté, and B. Faltings, “Privacy-Preserving Multi-agent Constraint Satisfaction”, International Conference on Computational Science and Engineering, Vol. 3, pages 17-25, 2009. JM. Such, A. Espinosa, A. GarcíA-Fornes, and C. Sierra, "Self-disclosure decision making based on intimacy and privacy." Journal of Information Sciences Vol 211, 2012, pages 93-111. JM. Such, A. Espinosa, A. GarcíA-Fornes, and C. Sierra, “A Survey of Privacy in Multi-agent Systems”, Knowledge Engineering Review, in press, 2012. M. Klusch, S. Lodi, and G. Moro, “Issues of agent-based distributed data mining.”, In Proceedings of the second international joint conference on Autonomous agents and multiagent systems, ACM, pages 1034-1035, 2003, DOI=10.1145/860575.860782 H.F. Rashvand, K. Salah, J.M.A Calero, L. Harn: “Distributed security for multi-agent systems - review and applications”. IET Inf. Secur. 4(4), pages 188–201, 2012. S. V. Nagaraj, "Securing Multi-agent Systems: A Survey." Advances in Computing and Information Technology, pages 23-30, 2012. R.A. Martins, M.E. Correia, and A.B. Augusto, "A literature review of security mechanisms employed by mobile agents," Information Systems and Technologies (CISTI), 7th Iberian Conference, pages 1-4, 2012. Y. Krupa and L. Vercouter "Handling privacy as contextual integrity in decentralized virtual communities: The PrivaCIAS framework." Web Intelligence and Agent Systems, pages 105-116, 2012. Y. Krupa, "PrivaCIAS: Privacy as Contextual Integrity in Decentralized Multi-Agent Systems." PhD dissertation, Université de Caen, 2012. S. Chakraborty, Z. Charbiwala, H. Choi, KR. Raghavan, and MB. Srivastava, "Balancing behavioral privacy and information utility in sensory data flows." Pervasive and Mobile Computing, Volume 8, Issue 3, Pages 331–345 2012. C. Dwork, “Differential Privacy”, Automata, Languages and Programming, Lecture Notes in Computer Science, Springer, Vol. 4052, pages 1-12, 2006. V. Ciriani, S.D. Di Vimercati, S. Foresti, and P. Samarati, “Theory of privacy and anonymity”. In Algorithms and theory of computation handbook (2 ed.), pages 18-18, Chapman and Hall/CRC, 2010, ISBN:978-1-58488-820-8. P. Samarati and L. Sweeney, “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression”, IEEE Symp on Research in Security and Privacy, pp. 384–393, 1998. US Federal Election Comission, Campaign Finance Disclosure Portal, Online, [Retrieved: March 2013] http://www.fec.gov/pindex.shtml L.N. Foner, "A security architecture for multi-agent matchmaking." In Proceeding of Second International Conference on Multi-Agent System, Mario Tokoro. Pages 80-86, 1996. C.H. Wong, and K. Sycara. "Adding security and trust to multiagent systems." Applied Artificial Intelligence Vol. 14, no. 9, pages 927-941, 2002. E. Yu, and L. Cysneiros. "Designing for Privacy in a Multi-agent World." Trust, Reputation, and Security: Theories and Practice, pages: 259-269, 2003. S.D. Ramchurn, D. Huynh, and N.R. Jennings. "Trust in multi-agent systems." The Knowledge Engineering Review Vol. 19, no. 1, pages 1-25, 2004. Y. Jung, M. Kim, A. Masoumzadeh, and J.BD. Joshi. "A survey of security issue in multi-agent systems." Artificial Intelligence Review, Vol. 37, no. 3, pages 239-260, 2012. R.A. Martins, M.E. Correia, and A.B. Augusto, "A literature review of security mechanisms employed by mobile agents," 7th Iberian Conference on Information Systems and Technologies (CISTI), pages1-4, 2012. V. Katos, F. Stowell, and P. Bednar, “Surveillance, Privacy and the Law of Requisite Variety”, Data Privacy Management and Autonomous Spontaneous Security, Lecture Notes in Computer Science Vol. 6514, pages 123–139, 2011. S. Spiekermann, “The challenges of privacy by design,” Communications of the ACM, vol. 55, no. 7, page 38, 2012. M. Friedewald, D. Wright, S. Gutwirth, and E. Mordini, “Privacy, data protection and emerging sciences and technologies: towards a common framework,” Innovation: The European Journal of Social Science Research, vol. 23, no. 1, pp. 61–67, Mar. 2010. 23 COGNITIVE 2013
  • 24. THANK YOU. Contact: kmivule at gmail dot com 24 COGNITIVE 2013