资源论文Tamper-Proof Privacy Auditing for Artificial Intelligence Systems Andrew Sutton and Reza Samavi

Tamper-Proof Privacy Auditing for Artificial Intelligence Systems Andrew Sutton and Reza Samavi

2019-11-06 | |  52 |   48 |   0
Abstract Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation.

上一篇:Marathon Race Planning: A Case-Based Reasoning Approach

下一篇:Multi-Objective Optimization Through Pareto Minimal Correction Subsets?

用户评价
全部评价

热门资源

  • Learning to Predi...

    Much of model-based reinforcement learning invo...

  • Stratified Strate...

    In this paper we introduce Stratified Strategy ...

  • The Variational S...

    Unlike traditional images which do not offer in...

  • Learning to learn...

    The move from hand-designed features to learned...

  • A Mathematical Mo...

    Direct democracy, where each voter casts one vo...