Time filter

Source Type

Baabda, Lebanon

Al Bouna B.,Qatar University | Al Bouna B.,Antonin University | Clifton C.,Purdue University | Malluhi Q.,Qatar University
Journal of Computer Security | Year: 2015

In this paper, we study the privacy breach caused by unsafe correlations in transactional data where individuals have multiple tuples in a dataset. We provide two safety constraints to guarantee safe correlation of the data: (1) the safe grouping constraint to ensure that quasi-identifier and sensitive partitions are bounded by l-diversity and (2) the schema decomposition constraint to eliminate non-arbitrary correlations between non-sensitive and sensitive values to protect privacy and at the same time increase the aggregate analysis. In our technique, values are grouped together in unique partitions that enforce l-diversity at the level of individuals. We also propose an association preserving technique to increase the ability to learn/analyze from the anonymized data. To evaluate our approach, we conduct a set of experiments to determine the privacy breach and investigate the anonymization cost of safe grouping and preserving associations. © 2015 - IOS Press and the authors. All rights reserved. Source

Al Bouna B.,Antonin University | Chbeir R.,University of Burgundy | Gabillon A.,University of French Polynesia | Capolsini P.,University of French Polynesia
8th International Conference on Signal Image Technology and Internet Based Systems, SITIS 2012r | Year: 2012

Sharing and publishing images and photos have become the trend of nowadays (social networks, messengers, etc.). Providing appropriate techniques to preserve privacy and protect content of sensitive and private images is an essential need. In this paper, we present a novel security model for image content protection. In our model, we provide dynamic security rules based on first order logic to express constraints that can be applied to contextual information as well as low level features of images. We finally discuss a set of experiments and studies carried out to evaluate the proposed approach. © 2012 IEEE. Source

Bayard S.,Montpellier University | Erkes J.,Antonin University | Moroni C.,University of Lille Nord de France
Archives of Clinical Neuropsychology | Year: 2011

The Stroop Color-Word Test-Victoria version (VST) is a measure of executive function commonly used in neuropsychological evaluation. Because of its short administration time, the VST seems particularly appropriate for use in geriatric populations and with those suffering from dementia and who are prone to fatigue during neuropsychological examination. In this study, we examine the influence of demographic characteristics on VST score and present descriptive data for a sample of 244 elderly French speakers (50-94 years of age). Normative data corrected for age and education are provided for clinical use. Furthermore, by comparing the VST performance of patients with the Alzheimer-type dementia to that of 40 matched healthy controls, we provide clinical evidence suggesting that the VST has a clinical utility in the assessment of inhibition in AD. © The Author 2011. Published by Oxford University Press. All rights reserved. Source

Raad E.,Memorial University of Newfoundland | Al Bouna B.,Antonin University | Chbeir R.,University of Pau and Pays de lAdour
International Journal of Information Security | Year: 2016

A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly viewed as a key enabler for social media preservation tasks. In the current situation, where information sharing and inter-user communications are made instantly possible via the widespread use of ubiquitous technologies, privacy related, and particularly information disclosure issues, are the obvious, much discussed, immediate consequences of information sharing. As a result, information disclosure, especially when multimedia data come to play, is critical for appropriate social media preservation strategies that consider and respect the privacy of social network users. Social media preservation must align with privacy protection solutions and consequently must protect sensitive information that social network users would like to keep private. In this paper, we propose a new approach to implement a privacy-oriented social media preservation strategy that prevents the disclosure of sensitive information. Instead of using a preserve-all strategy, we present a framework to personalize social media preservation tasks. We then describe our proposed rule-based algorithm to evaluate information disclosure addressing mainly relationship type disclosure and using shared photos. We also provide an experimental study to investigate the efficiency and the relevance of our approach. © 2015, Springer-Verlag Berlin Heidelberg. Source

Al Bouna B.,Antonin University | Chbeir R.,University of Burgundy | Gabillon A.,University of French Polynesia
SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography | Year: 2011

The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model's related information and multimedia objects data. To specify security rules, we use the SWRL language in order to address both, the content and the context of multimedia objects. Source

Discover hidden collaborations