Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Abramson, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.02855  [pdf, other

    cs.CR cs.CY

    PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

    Authors: William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo

    Abstract: The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructure may include the Citizen, a Testing Centre (TC), a Health Authority (HA), and a Government Authority (GA). Typically, these different domains need to… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Journal ref: IEEE SIN 2021

  2. arXiv:2106.08258  [pdf, other

    cs.CY

    Identifying Roles, Requirements and Responsibilities in Trustworthy AI Systems

    Authors: Iain Barclay, Will Abramson

    Abstract: Artificial Intelligence (AI) systems are being deployed around the globe in critical fields such as healthcare and education. In some cases, expert practitioners in these domains are being tasked with introducing or using such systems, but have little or no insight into what data these complex systems are based on, or how they are put together. In this paper, we consider an AI system from the doma… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: Pre-print of paper submitted to Workshop on Reviewable and Auditable Pervasive Systems (WRAPS)

  3. arXiv:2104.12385  [pdf, other

    cs.LG cs.CR

    Syft 0.5: A Platform for Universally Deployable Structured Transparency

    Authors: Adam James Hall, Madhava Jay, Tudor Cebere, Bogdan Cebere, Koen Lennart van der Veen, George Muraru, Tongye Xu, Patrick Cason, William Abramson, Ayoub Benaissa, Chinmay Shah, Alan Aboudib, Théo Ryffel, Kritika Prakash, Tom Titcombe, Varun Kumar Khare, Maddie Shang, Ionesio Junior, Animesh Gupta, Jason Paumier, Nahua Kang, Vova Manannikov, Andrew Trask

    Abstract: We present Syft 0.5, a general-purpose framework that combines a core group of privacy-enhancing technologies that facilitate a universal set of structured transparency systems. This framework is demonstrated through the design and implementation of a novel privacy-preserving inference information flow where we pass homomorphically encrypted activation signals through a split neural network for in… ▽ More

    Submitted 27 April, 2021; v1 submitted 26 April, 2021; originally announced April 2021.

    Comments: ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021)

  4. arXiv:2103.15753  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Privacy and Trust Redefined in Federated Machine Learning

    Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan

    Abstract: A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited. Luckily, privacy-preserving technologies have been developed to overcome this hurdle by distributing the computation of the training and ensuring th… ▽ More

    Submitted 30 March, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: MDPI Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356; https://doi.org/10.3390/make3020017

    Journal ref: Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356

  5. Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting

    Authors: Will Abramson, Nicole E. van Deursen, William J Buchanan

    Abstract: A substantial administrative burden is placed on healthcare professionals as they manage and progress through their careers. Identity verification, pre-employment screening and appraisals: the bureaucracy associated with each of these processes takes precious time out of a healthcare professional's day. Time that could have been spent focused on patient care. In the midst of the COVID-19 crisis, i… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Journal ref: Blockchain in Healthcare Today, 3 (2020)

  6. arXiv:2006.02456  [pdf, other

    cs.CR cs.CY cs.DC cs.GT cs.LG

    A Distributed Trust Framework for Privacy-Preserving Machine Learning

    Authors: Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J Buchanan

    Abstract: When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluctant to relinquish control of private information to third parties. Privacy-preserving techniques distribute computation in order to ensure that data r… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

    Comments: To be published in the proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020

    Report number: TrustBus 2020, LNCS 12395, pp. 205--220, 2020 MSC Class: 68M25 ACM Class: C.2.0

    Journal ref: 17th International Conference TrustBus 2020

  7. arXiv:1912.12257  [pdf, other

    cs.CR cs.ET

    Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device

    Authors: Jon Barton, William J Buchanan, Nikolaos Pitropakis, Sarwar Sayeed, Will Abramson

    Abstract: Advances in quantum computing make Shor's algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discrete logarithms, such as with the Diffie-Hellman key exchange method. For a cryptographic system to remain secure against a quantum adversary, we need to… ▽ More

    Submitted 7 February, 2022; v1 submitted 20 September, 2019; originally announced December 2019.

    Journal ref: 8th International Conference on Information Systems Security and Privacy (ICISSP) 2022