Abstract
Useful to be aware of such statistical techniques. Potential to build into a trusted/trustworthy system - as defences, gatekeepers, tools. Bayesian network-based analysis to reason about users' obfuscation of information. Can be used to identify obfuscation and unobfuscate (predict true values); or to assist users to better obfuscate their data. (p85) contexts of users: data about the user and their activities. (p85) access control rules: user designates who has access, under what contitions, to information about themselves. (p85) obfuscation rules: user designates who has access to abstracted, or even falsified, information in certain conditions. (p85)
Cite
CITATION STYLE
Recha, C. W., Makokha, G. L., Shisanya, C. A., & Mukopi, M. N. (2017). Climate Variability: Attributes and Indicators of Adaptive Capacity in Semi-Arid Tharaka Sub-County, Kenya. OALib, 04(05), 1–14. https://doi.org/10.4236/oalib.1103505
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.