SlideShare ist ein Scribd-Unternehmen logo
1 von 25
COGNITIVE 2014 – Venice Italy
Towards Agent-based Data Privacy Engineering
Kato Mivule, D.Sc.
Computer Science Department
Bowie State University
Kato Mivule - Bowie State University Department of Computer Science
Engineering
Privacy
Data
Outline
• Introduction
• The Problem
• Contributions
• Methodology
• Results and Discussion
• Results
• Discussion
• Conclusion and Future work
• Conclusion
• Future work
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Motivation
• To create a systematic framework that can be followed for the
data privacy engineering process. Could we have agents that
autonomously implement privacy?
• Given any original dataset X, a set of data privacy engineering
phases should be followed from start to completion in the
generation of a privatized dataset Y.
Contributions
• A proposed agent-based data privacy and utility engineering
framework, SIED.
• A proposed agent-based Privacy Parameter Mapping Heuristic.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Motivation
• Data Privacy Engineering – embedding legal privacy
definitions in technology and governance, Kenny and Borking
(2002).
• Design intelligent autonomous data privacy agents.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Wooldridge (1997): Three essential considerations (i) Agent
Specifications, (ii) agent implementation, and lastly (iii) agent
validation.
• Wooldridge and Jennings (1999): Avoid common pitfall - the
tendency to offer generic architectures for intelligent agents.
• Jennings (2000): Agent based software engineering remains
complex and difficult, due to the interactions between different
components.
• Borking and Raab (2001): called for Privacy Enhancing
Technologies (PETs) from a legal perspective on technology.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Kenny and Borking (2002): “Privacy engineering” as
embedding privacy legal requirements into technological and
governance blueprints.
• Van Blarkom, Borking, and Olk (2003): PETs would be
helpful in tackling privacy threats caused by intelligent agents
that illegally disclose a user’s personal information.
• Léauté and Faltings (2009): proposed an agent based privacy
engineering solution using constraint satisfaction model by
mapping out privacy constraints in the domain.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Cavoukian (2011): outlined seven privacy by design principles
that included:
• (i) proactive, not reactive; preventative not remedial.
• (ii) engineering privacy as the default.
• (iii) privacy embedded into design.
• (iv) full privacy functionality by avoiding needless trade-offs.
• (v) end-to-end security and life cycle protection.
• (vi) visibility and transparency of privacy practices.
• (vii) respect for user privacy.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Literature Review
• Such, Espinosa, and Garcia-Fornes (2012): Privacy violations
that autonomous agents engage include:
• (i) secondary use, such as profiling,
• (ii) identity theft
• (iii) spy agents
• (iv) unauthorized access
• (v) traffic analysis
• (vi) unauthorized dissemination of data.
• Such et.al., argued: agent based privacy solutions should be
incorporated in the design of information technology systems.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework
• SIED phases – Specifications, Implementation, Evaluation, and
Dissemination
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Specification Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Implementation Phase:
Bowie State University Department of Computer Science
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Evaluation Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Dissemination Phase:
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – The Proposed SIED Data Privacy Engineering
Framework – Dissemination Phase.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Methodology – Privacy Parameter Mapping Heuristic.
• Categorize parameters for effective fine-tuning.
•What parameters need adjustment in the data privacy process?
COGNITIVE 2014 – Venice Italy
CATEGORY 1
PARAMETERS
CATEGORY 2
PARAMETERS
CATEGORY 3
PARAMETERS
Data Utility Goal Parameters:
For example Accuracy, Currency,
and Completeness.
Data Privacy Algorithm Parameters:
Values k in k-anonymity, ε in Noise
addition and Differential privacy.
Application Parameters (e.g. Machine
Learning Classifier):
For example weak learners in
AdaBoost.
Parameter
Adjustment and
Fine-tuning
Trade-offs
Data Privacy and Utility
Preservation
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Experiment Results – Non-Interactive Differential Privacy (DP)
COGNITIVE 2014 – Venice Italy
Data Specifications and Requirements
• Used the Fisher Iris data set at the UCI
repository
• Contained 150 data points – multivariate
• Both numeric and categorical data items
• Applied vertical partitioning
• Applied data privacy to only numerical
data
• Applied data privacy to each vertical
partition
• Used differential privacy as SDC method
• Evaluated data utility using machine
learning as a gauge
• Publication of privatized data was non-
interactive mode
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Results – Non-Interactive Differential Privacy (DP) and Signal
Processing (Filtering)
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Results – Non-Interactive Differential Privacy – Non-filtered and
Filtered DP Classification Error
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Conclusion
• An abstract view of SIED, an agent-based data privacy
engineering framework has been presented.
• We believe that this a contribution to the privacy-by-design
challenge.
• A survey of related work on agent-based software engineering
and the influence on data privacy engineering, has been
presented.
• While SIED is proposed as a framework for agent-based data
privacy engineering, it could be generalized for other non-agent-
based data privacy processing as well.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Conclusion
• The subject of data privacy remains a challenge and more
research, design, implementation, and metrics is needed to
accommodate the ambiguous and fuzzy privacy requirements of
individuals and entities.
• We believe that intelligent agent-based architectures offer
optimism for data privacy solutions.
• For future works, we plan on expanding this study to take a
decomposition approach in dealing with the complexity of agent-
based data privacy engineering.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
References
[1] A. Cavoukian, Privacy by Design… Take the Challenge. Information & Privacy Commissioner of Ontario, 2009.
[2] A. Cavoukian, S. Taylor, and M. Abrams, “Privacy by Design: Essential for Organisational Accountability and Strong Business Practices.,” Identity Inf. Soc., vol. 3, no. 2, 2010, pp. 405–413.
[3] V. G. Cerf, “Freedom and the social contract,” Commun. ACM, vol. 56, no. 9, 2013, pp. 7.
[4] S. Spiekermann, “The challenges of privacy by design,” Commun. ACM, vol. 55, no. 7, Jul. 2012, pp. 38.
[5] V. Katos, F. Stowell, and P. Bednar, “Surveillance , Privacy and the Law of Requisite Variety,” 2011, pp. 123–139.
[6] K. Mivule, D. Josyula, and C. Turner, “An Overview of Data Privacy in Multi-Agent Learning Systems,” in the fifth COGNITIVE, 2013, no. c, pp. 14–20.
[7] K. Mivule and C. Turner, “A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge,” Procedia Comput. Sci., vol. 20, 2013, pp. 414–419.
[8] R. Dayarathna, “Taxonomy for Information Privacy Metrics,” J. Int. Commer. Law Technol., vol. 6, no. 4, 2011, pp. 194–206.
[9] G. J. Matthews and O. Harel, “Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy,” Stat. Surv., vol. 5, 2011, pp. 1–29.
[10] I. Sommerville, Software Engineering, 9th ed. Addison-Wesley, 2010, pp. 27–50.
[11] G. Booch, Object Oriented Analysis & Design with Application. Santa Clara, CA: Addison-Wesley, 1994, pp. 14–20.
[12] M. Wooldridge, “Agent-based software engineering,” IEE Proc. - Softw. Eng., vol. 144, no. 1, 1997, pp. 26.
[13] M. J. Wooldridge and N. R. Jennings, “Software engineering with agents: Pitfalls and pratfalls.,” IEEE Internet Comput., vol. 3, no. Jun, 1999, pp. 20–27.
[14] N. R. Jennings, “On agent-based software engineering,” Artif. Intell., vol. Volume 117, no. 2, 2000, pp. 277–296.
[15] J. J. Borking and C. Raab, “Laws, PETs and other technologies for privacy protection.,” J. Information, Law Technol., vol. 1, 2001, pp. 1–14.
[16] S. Kenny and J. Borking, “The Value of Privacy Engineering,” J. Information, Law Technol., vol. 2., no. 1, 2002.
[17] G. W. Van Blarkom, J. J. Borking, and J. G. E. Olk, Handbook of privacy and privacy-enhancing technologies. The Hague: College Bescherming Persoonsgegevens, 2003, pp. 1–4.
[18] F. L. y López, M. Luck, and M. D’Inverno, “A Normative Framework for Agent-Based Systems,” Comput. Math. Organ. Theory, vol. 12, no. 2–3, 2004, pp. 227–250.
[19] P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, “Tropos: An agent-oriented software development methodology.,” Auton. Agent. Multi. Agent. Syst., vol. 8, no. 3, 2004, pp. 203–236.
[20] F. Zambonelli and A. Omicini, “Challenges and research directions in agent-oriented software engineering,” Auton. Agent. Multi. Agent. Syst., vol. 9, no. 3, pp. 253–283.
[21] S. Park and V. Sugumaran, “Designing multi-agent systems: a framework and application,” Expert Syst. Appl., vol. 28, no. 2, Feb. 2005, pp. 259–271.
[22] F. Bellifemine, G. Caire, A. Poggi, and G. Rimassa, “JADE: A software framework for developing multi-agent applications. Lessons learned,” Inf. Softw. Technol., vol. 50, no. 1–2, Jan. 2008, pp. 10–21.
[23] D. Weyns, H. V. D. Parunak, and O. Shehory, “The Future of Software Engineering and Multi-Agent Systems,” Int. J. Agent-Oriented Softw. Eng., vol. 3, no. 4, 2008, pp. 1–8.
[24] M. Cossentino, N. Gaud, V. Hilaire, S. Galland, and A. Koukam, “ASPECS: an agent-oriented software process for engineering complex systems,” Auton. Agent. Multi. Agent. Syst., vol. 20, no. 2, Jun. 2009, pp. 260–304.
[25] T. Leaute and B. Faltings, “Privacy-Preserving Multi-agent Constraint Satisfaction,” in 2009 International Conference on Computational Science and Engineering, 2009, pp. 17–25.
[26] J. M. Gascueña, E. Navarro, and A. Fernández-Caballero, “Model-driven engineering techniques for the development of multi-agent systems,” Eng. Appl. Artif. Intell., vol. 25, no. 1, 2012, pp. 159–173, Feb.
[27] A. Cavoukian, Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices. Office of the Information and Privacy Commissioner (2011), 2011.
[28] J. M. Such, A. Espinosa, and A. Garcia-Fornes, “A survey of privacy in multi-agent systems,” Knowl. Eng. Rev., 2012, pp. 1–31.
[29] D. Aggarwal and A. Singh, “Software Agent Reusability Mechanism at Application Level,” Glob. J. Comput. Sci. Technol., vol. 13, no. 3, 2013, pp. 8–12.
[30] H. Hayashi, S. Tokura, F. Ozaki, and M. Doi, “Background sensing control for planning agents working in the real world.,” in Agent and Multi-Agent Systems: Technologies and Applications, 2008, pp. 11–20.
[31] K. Mivule and C. Turner, “A Review of Privacy Essentials for Confidential Mobile Data Transactions,” Int. J. Comput. Sci. Mob. Comput. ICMIC13,, no. December, 2013, pp. 36–43.
[32] A. Krause and E. Horvitz, “A Utility-Theoretic Approach to Privacy in Online Services,” J. Artif. Intell. Res., vol. 39, 2010, pp. 633–662.
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science
Thank You!
Questions?
Contact: kmivule@gmail.com
COGNITIVE 2014 – Venice Italy
Engineering
Privacy
Data
Kato Mivule - Bowie State University Department of Computer Science

Weitere ähnliche Inhalte

Was ist angesagt?

Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...ijitjournal
 
Effective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEffective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEditor IJCATR
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachIRJET Journal
 
Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device IJECEIAES
 
Multimedia mining research – an overview
Multimedia mining research – an overview  Multimedia mining research – an overview
Multimedia mining research – an overview ijcga
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14Chinmoy Ghorai
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...IJECEIAES
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems IJECEIAES
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
 
How to improve the statistical power of the 10-fold cross validation scheme i...
How to improve the statistical power of the 10-fold crossvalidation scheme i...How to improve the statistical power of the 10-fold crossvalidation scheme i...
How to improve the statistical power of the 10-fold cross validation scheme i...Andrej Kosir
 
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES_FP7
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021AIRCC Publishing Corporation
 
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesSven Wohlgemuth
 

Was ist angesagt? (20)

Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
Effective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEffective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography Techniques
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device
 
Multimedia mining research – an overview
Multimedia mining research – an overview  Multimedia mining research – an overview
Multimedia mining research – an overview
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14It final upto_4th_year syllabus_14.03.14
It final upto_4th_year syllabus_14.03.14
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems
 
CV-RPLiu-2014
CV-RPLiu-2014CV-RPLiu-2014
CV-RPLiu-2014
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER Project
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
How to improve the statistical power of the 10-fold cross validation scheme i...
How to improve the statistical power of the 10-fold crossvalidation scheme i...How to improve the statistical power of the 10-fold crossvalidation scheme i...
How to improve the statistical power of the 10-fold cross validation scheme i...
 
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021
 
323462348
323462348323462348
323462348
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
 

Andere mochten auch

Diss defense
Diss defenseDiss defense
Diss defensetherob762
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense alexmessina
 
Ed s turner iii oral defense presentation - 18 feb 10
Ed s  turner iii   oral defense presentation - 18 feb 10Ed s  turner iii   oral defense presentation - 18 feb 10
Ed s turner iii oral defense presentation - 18 feb 10Dr. Ed S. Turner III
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Kato Mivule
 
Dissertation Defense Presentation
Dissertation Defense PresentationDissertation Defense Presentation
Dissertation Defense PresentationDr. Timothy Kelly
 
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...BMS Institute of Technology and Management
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentationDr. Naomi Mangatu
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpointneha47
 

Andere mochten auch (10)

Diss defense
Diss defenseDiss defense
Diss defense
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense
 
Ed s turner iii oral defense presentation - 18 feb 10
Ed s  turner iii   oral defense presentation - 18 feb 10Ed s  turner iii   oral defense presentation - 18 feb 10
Ed s turner iii oral defense presentation - 18 feb 10
 
Asim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defenseAsim abdulkhaleq final phd dissertation defense
Asim abdulkhaleq final phd dissertation defense
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
defense_2
defense_2defense_2
defense_2
 
Dissertation Defense Presentation
Dissertation Defense PresentationDissertation Defense Presentation
Dissertation Defense Presentation
 
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 

Ähnlich wie Agent-based Data Privacy Engineering Framework SIED

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...Marco Balduini
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitaebutest
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSbinuvijay1
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Paul Fechtelkotter
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of thingsnajascj
 
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...Luca Berardinelli
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSbinuvijay1
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET Journal
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijwscjournal
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijdms
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxVinay Ms
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)ijdms
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, GermanyCharith Perera
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Universita della Calabria,
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptxishwar69
 

Ähnlich wie Agent-based Data Privacy Engineering Framework SIED (20)

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
FraPPE: a vocabulary to represent heterogeneous spatio-temporal data to suppo...
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
UNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGSUNIT I INTRODUCTION TO INTERNET OF THINGS
UNIT I INTRODUCTION TO INTERNET OF THINGS
 
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
Smart Factory Technology Road Mapping Initiative_The Intent of Things and Ana...
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
 
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
COMBINING MODEL-DRIVEN ENGINEERING AND ELASTIC EXECUTION FOR TESTING UNCERTAI...
 
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGSIOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
IOT UNIT 1 INTRODUCTION TO INTERNET OF THINGS
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AI
 
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Introduction in IOT.pptx
Introduction in IOT.pptxIntroduction in IOT.pptx
Introduction in IOT.pptx
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 

Mehr von Kato Mivule

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization Kato Mivule
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Kato Mivule
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...Kato Mivule
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyKato Mivule
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsKato Mivule
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoostKato Mivule
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierKato Mivule
 

Mehr von Kato Mivule (20)

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 

Kürzlich hochgeladen

FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Onlineanilsa9823
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlkumarajju5765
 

Kürzlich hochgeladen (20)

FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Chinhat Lucknow best sexual service Online
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
 

Agent-based Data Privacy Engineering Framework SIED

  • 1. COGNITIVE 2014 – Venice Italy Towards Agent-based Data Privacy Engineering Kato Mivule, D.Sc. Computer Science Department Bowie State University Kato Mivule - Bowie State University Department of Computer Science Engineering Privacy Data
  • 2. Outline • Introduction • The Problem • Contributions • Methodology • Results and Discussion • Results • Discussion • Conclusion and Future work • Conclusion • Future work COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 3. Motivation • To create a systematic framework that can be followed for the data privacy engineering process. Could we have agents that autonomously implement privacy? • Given any original dataset X, a set of data privacy engineering phases should be followed from start to completion in the generation of a privatized dataset Y. Contributions • A proposed agent-based data privacy and utility engineering framework, SIED. • A proposed agent-based Privacy Parameter Mapping Heuristic. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 4. Motivation • Data Privacy Engineering – embedding legal privacy definitions in technology and governance, Kenny and Borking (2002). • Design intelligent autonomous data privacy agents. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 5. Literature Review • Wooldridge (1997): Three essential considerations (i) Agent Specifications, (ii) agent implementation, and lastly (iii) agent validation. • Wooldridge and Jennings (1999): Avoid common pitfall - the tendency to offer generic architectures for intelligent agents. • Jennings (2000): Agent based software engineering remains complex and difficult, due to the interactions between different components. • Borking and Raab (2001): called for Privacy Enhancing Technologies (PETs) from a legal perspective on technology. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 6. Literature Review • Kenny and Borking (2002): “Privacy engineering” as embedding privacy legal requirements into technological and governance blueprints. • Van Blarkom, Borking, and Olk (2003): PETs would be helpful in tackling privacy threats caused by intelligent agents that illegally disclose a user’s personal information. • Léauté and Faltings (2009): proposed an agent based privacy engineering solution using constraint satisfaction model by mapping out privacy constraints in the domain. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 7. Literature Review • Cavoukian (2011): outlined seven privacy by design principles that included: • (i) proactive, not reactive; preventative not remedial. • (ii) engineering privacy as the default. • (iii) privacy embedded into design. • (iv) full privacy functionality by avoiding needless trade-offs. • (v) end-to-end security and life cycle protection. • (vi) visibility and transparency of privacy practices. • (vii) respect for user privacy. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 8. Literature Review • Such, Espinosa, and Garcia-Fornes (2012): Privacy violations that autonomous agents engage include: • (i) secondary use, such as profiling, • (ii) identity theft • (iii) spy agents • (iv) unauthorized access • (v) traffic analysis • (vi) unauthorized dissemination of data. • Such et.al., argued: agent based privacy solutions should be incorporated in the design of information technology systems. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 9. Methodology – The Proposed SIED Data Privacy Engineering Framework • SIED phases – Specifications, Implementation, Evaluation, and Dissemination COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 10. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 11. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 12. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 13. Methodology – The Proposed SIED Data Privacy Engineering Framework – Specification Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 14. Methodology – The Proposed SIED Data Privacy Engineering Framework – Implementation Phase: Bowie State University Department of Computer Science COGNITIVE 2014 – Venice Italy Engineering Privacy Data
  • 15. Methodology – The Proposed SIED Data Privacy Engineering Framework – Evaluation Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 16. Methodology – The Proposed SIED Data Privacy Engineering Framework – Dissemination Phase: COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 17. Methodology – The Proposed SIED Data Privacy Engineering Framework – Dissemination Phase. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 18. Methodology – Privacy Parameter Mapping Heuristic. • Categorize parameters for effective fine-tuning. •What parameters need adjustment in the data privacy process? COGNITIVE 2014 – Venice Italy CATEGORY 1 PARAMETERS CATEGORY 2 PARAMETERS CATEGORY 3 PARAMETERS Data Utility Goal Parameters: For example Accuracy, Currency, and Completeness. Data Privacy Algorithm Parameters: Values k in k-anonymity, ε in Noise addition and Differential privacy. Application Parameters (e.g. Machine Learning Classifier): For example weak learners in AdaBoost. Parameter Adjustment and Fine-tuning Trade-offs Data Privacy and Utility Preservation Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 19. Experiment Results – Non-Interactive Differential Privacy (DP) COGNITIVE 2014 – Venice Italy Data Specifications and Requirements • Used the Fisher Iris data set at the UCI repository • Contained 150 data points – multivariate • Both numeric and categorical data items • Applied vertical partitioning • Applied data privacy to only numerical data • Applied data privacy to each vertical partition • Used differential privacy as SDC method • Evaluated data utility using machine learning as a gauge • Publication of privatized data was non- interactive mode Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 20. Results – Non-Interactive Differential Privacy (DP) and Signal Processing (Filtering) COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 21. Results – Non-Interactive Differential Privacy – Non-filtered and Filtered DP Classification Error COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 22. Conclusion • An abstract view of SIED, an agent-based data privacy engineering framework has been presented. • We believe that this a contribution to the privacy-by-design challenge. • A survey of related work on agent-based software engineering and the influence on data privacy engineering, has been presented. • While SIED is proposed as a framework for agent-based data privacy engineering, it could be generalized for other non-agent- based data privacy processing as well. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 23. Conclusion • The subject of data privacy remains a challenge and more research, design, implementation, and metrics is needed to accommodate the ambiguous and fuzzy privacy requirements of individuals and entities. • We believe that intelligent agent-based architectures offer optimism for data privacy solutions. • For future works, we plan on expanding this study to take a decomposition approach in dealing with the complexity of agent- based data privacy engineering. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 24. References [1] A. Cavoukian, Privacy by Design… Take the Challenge. Information & Privacy Commissioner of Ontario, 2009. [2] A. Cavoukian, S. Taylor, and M. Abrams, “Privacy by Design: Essential for Organisational Accountability and Strong Business Practices.,” Identity Inf. Soc., vol. 3, no. 2, 2010, pp. 405–413. [3] V. G. Cerf, “Freedom and the social contract,” Commun. ACM, vol. 56, no. 9, 2013, pp. 7. [4] S. Spiekermann, “The challenges of privacy by design,” Commun. ACM, vol. 55, no. 7, Jul. 2012, pp. 38. [5] V. Katos, F. Stowell, and P. Bednar, “Surveillance , Privacy and the Law of Requisite Variety,” 2011, pp. 123–139. [6] K. Mivule, D. Josyula, and C. Turner, “An Overview of Data Privacy in Multi-Agent Learning Systems,” in the fifth COGNITIVE, 2013, no. c, pp. 14–20. [7] K. Mivule and C. Turner, “A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge,” Procedia Comput. Sci., vol. 20, 2013, pp. 414–419. [8] R. Dayarathna, “Taxonomy for Information Privacy Metrics,” J. Int. Commer. Law Technol., vol. 6, no. 4, 2011, pp. 194–206. [9] G. J. Matthews and O. Harel, “Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy,” Stat. Surv., vol. 5, 2011, pp. 1–29. [10] I. Sommerville, Software Engineering, 9th ed. Addison-Wesley, 2010, pp. 27–50. [11] G. Booch, Object Oriented Analysis & Design with Application. Santa Clara, CA: Addison-Wesley, 1994, pp. 14–20. [12] M. Wooldridge, “Agent-based software engineering,” IEE Proc. - Softw. Eng., vol. 144, no. 1, 1997, pp. 26. [13] M. J. Wooldridge and N. R. Jennings, “Software engineering with agents: Pitfalls and pratfalls.,” IEEE Internet Comput., vol. 3, no. Jun, 1999, pp. 20–27. [14] N. R. Jennings, “On agent-based software engineering,” Artif. Intell., vol. Volume 117, no. 2, 2000, pp. 277–296. [15] J. J. Borking and C. Raab, “Laws, PETs and other technologies for privacy protection.,” J. Information, Law Technol., vol. 1, 2001, pp. 1–14. [16] S. Kenny and J. Borking, “The Value of Privacy Engineering,” J. Information, Law Technol., vol. 2., no. 1, 2002. [17] G. W. Van Blarkom, J. J. Borking, and J. G. E. Olk, Handbook of privacy and privacy-enhancing technologies. The Hague: College Bescherming Persoonsgegevens, 2003, pp. 1–4. [18] F. L. y López, M. Luck, and M. D’Inverno, “A Normative Framework for Agent-Based Systems,” Comput. Math. Organ. Theory, vol. 12, no. 2–3, 2004, pp. 227–250. [19] P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, “Tropos: An agent-oriented software development methodology.,” Auton. Agent. Multi. Agent. Syst., vol. 8, no. 3, 2004, pp. 203–236. [20] F. Zambonelli and A. Omicini, “Challenges and research directions in agent-oriented software engineering,” Auton. Agent. Multi. Agent. Syst., vol. 9, no. 3, pp. 253–283. [21] S. Park and V. Sugumaran, “Designing multi-agent systems: a framework and application,” Expert Syst. Appl., vol. 28, no. 2, Feb. 2005, pp. 259–271. [22] F. Bellifemine, G. Caire, A. Poggi, and G. Rimassa, “JADE: A software framework for developing multi-agent applications. Lessons learned,” Inf. Softw. Technol., vol. 50, no. 1–2, Jan. 2008, pp. 10–21. [23] D. Weyns, H. V. D. Parunak, and O. Shehory, “The Future of Software Engineering and Multi-Agent Systems,” Int. J. Agent-Oriented Softw. Eng., vol. 3, no. 4, 2008, pp. 1–8. [24] M. Cossentino, N. Gaud, V. Hilaire, S. Galland, and A. Koukam, “ASPECS: an agent-oriented software process for engineering complex systems,” Auton. Agent. Multi. Agent. Syst., vol. 20, no. 2, Jun. 2009, pp. 260–304. [25] T. Leaute and B. Faltings, “Privacy-Preserving Multi-agent Constraint Satisfaction,” in 2009 International Conference on Computational Science and Engineering, 2009, pp. 17–25. [26] J. M. Gascueña, E. Navarro, and A. Fernández-Caballero, “Model-driven engineering techniques for the development of multi-agent systems,” Eng. Appl. Artif. Intell., vol. 25, no. 1, 2012, pp. 159–173, Feb. [27] A. Cavoukian, Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices. Office of the Information and Privacy Commissioner (2011), 2011. [28] J. M. Such, A. Espinosa, and A. Garcia-Fornes, “A survey of privacy in multi-agent systems,” Knowl. Eng. Rev., 2012, pp. 1–31. [29] D. Aggarwal and A. Singh, “Software Agent Reusability Mechanism at Application Level,” Glob. J. Comput. Sci. Technol., vol. 13, no. 3, 2013, pp. 8–12. [30] H. Hayashi, S. Tokura, F. Ozaki, and M. Doi, “Background sensing control for planning agents working in the real world.,” in Agent and Multi-Agent Systems: Technologies and Applications, 2008, pp. 11–20. [31] K. Mivule and C. Turner, “A Review of Privacy Essentials for Confidential Mobile Data Transactions,” Int. J. Comput. Sci. Mob. Comput. ICMIC13,, no. December, 2013, pp. 36–43. [32] A. Krause and E. Horvitz, “A Utility-Theoretic Approach to Privacy in Online Services,” J. Artif. Intell. Res., vol. 39, 2010, pp. 633–662. COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science
  • 25. Thank You! Questions? Contact: kmivule@gmail.com COGNITIVE 2014 – Venice Italy Engineering Privacy Data Kato Mivule - Bowie State University Department of Computer Science