Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Collaborative filtering with privacy via factor analysis
SIGIR '02 Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Efficient Generation of Shared RSA Keys (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Practical Threshold RSA Signatures without a Trusted Dealer
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Multiparty Computation from Threshold Homomorphic Encryption
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Sharing Decryption in the Context of Voting or Lotteries
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Collaborative Filtering with Privacy
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
Shilling recommender systems for fun and profit
Proceedings of the 13th international conference on World Wide Web
PocketLens: Toward a personal recommender system
ACM Transactions on Information Systems (TOIS)
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
SVD-based collaborative filtering with privacy
Proceedings of the 2005 ACM symposium on Applied computing
Preventing shilling attacks in online recommender systems
Proceedings of the 7th annual ACM international workshop on Web information and data management
A privacy-preserving collaborative filtering scheme with two-way communication
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Classification features for attack detection in collaborative recommender systems
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Lies and propaganda: detecting spam users in collaborative filtering
Proceedings of the 12th international conference on Intelligent user interfaces
Secure two-party k-means clustering
Proceedings of the 14th ACM conference on Computer and communications security
Homomorphic encryption and secure comparison
International Journal of Applied Cryptography
Online subscriptions with anonymous access
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Privacy-Preserving Recommendation Systems for Consumer Healthcare Services
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Differentially private recommender systems: building privacy into the net
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Efficient proofs that a committed number lies in an interval
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Secure Vickrey auctions without threshold trust
FC'02 Proceedings of the 6th international conference on Financial cryptography
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Sub-linear zero-knowledge argument for correctness of a shuffle
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
Privacy-preserving collaborative recommender systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A Verifiable Secret Shuffle of Homomorphic Encryptions
Journal of Cryptology
Towards a comprehensive requirements architecture for privacy-aware social recommender systems
APCCM '10 Proceedings of the Seventh Asia-Pacific Conference on Conceptual Modelling - Volume 110
Reliable medical recommendation systems with patient privacy
Proceedings of the 1st ACM International Health Informatics Symposium
A Private and Reliable Recommendation System for Social Networks
SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
A Shuffling Scheme with Strict and Strong Security
SECURWARE '10 Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
A recommendation system for spots in location-based online social networks
Proceedings of the 4th Workshop on Social Network Systems
Detecting bad-mouthing attacks on reputation systems using self-organizing maps
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Secure and efficient protocols for iris and fingerprint identification
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Simple and efficient shuffling with provable correctness and ZK privacy
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Analysis and detection of segment-focused attacks against collaborative recommendation
WebKDD'05 Proceedings of the 7th international conference on Knowledge Discovery on the Web: advances in Web Mining and Web Usage Analysis
Efficient binary conversion for paillier encrypted values
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
ACM Transactions on Management Information Systems (TMIS) - Special Issue on Informatics for Smart Health and Wellbeing
Hi-index | 0.00 |
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure that any sensitive medical information collected by the system is properly secured. In this article, we codify these privacy concerns in a privacy-friendly framework and present two architectures that realize it: the Secure Processing Architecture (SPA) and the Anonymous Contributions Architecture (ACA). In SPA, patients submit their ratings in a protected form without revealing any information about their data and the computation of recommendations proceeds over the protected data using secure multiparty computation techniques. In ACA, patients submit their ratings in the clear, but no link between a submission and patient data can be made. We discuss various aspects of both architectures, including techniques for ensuring reliability of computed recommendations and system performance, and provide their comparison.