Secure Channel for Sharing Datasets by using Privacy-Preserving Integration Method

Author(s):  
G Sriman Narayana ◽  
Kuruva Arjun Kumar

In privacy-enhancing technology, it has been inevitably challenging to strike a maintain balance between privacy, efficiency and usability (utility). We propose a highly practical and efficient approach for privacy-preserving integration and sharing of datasets among a group of participants. At the heart of our solution is a new interactive protocol, Secure Channel. Through Secure Channel, each participant is able to randomize their datasets via an independent and untrusted third party, such that the resulting dataset can be merged with other randomized datasets contributed by other participants group in a privacy-preserving manner. Our process does not require any public or key sharing between participants in order to integrate different datasets. This, in turn, leads to a user can understand and use easily and scalable solution. Moreover, the accuracy of a randomized dataset which are returned by the third party can be securely verified by the other participant of group. We further demonstrate Secure Channel’s general utilities, using it to construct a structure preserving data integration protocol. This is mainly useful for, good quality integration of network traffic data.

Kybernetes ◽  
2018 ◽  
Vol 47 (5) ◽  
pp. 854-872 ◽  
Author(s):  
Kaiying Cao ◽  
Qiushi Bo ◽  
Yi He

Purpose This paper aims to study whether the recycling of a third party competes with the trade-in service of a manufacturer, and explores the optimal trade-in and third-party collection authorization strategies for the manufacturer. Design/methodology/approach According to whether to authorize a third party to collect its used products, the manufacturer has two choices: one is not authorization (NA); the other is authorization (A). This paper uses profit-maximization model to investigate the optimal decisions of the manufacturer and the third party under NA and A, respectively, and then explores which choice is better for the manufacturer. Findings It is observed that there is a competition between trade-in service and third-party recycling when the durability parameter of the used product is relatively small. Moreover, when the durability parameter of the used product is relatively large, A is always better choice for the manufacturer; otherwise, NA is a better choice except for the case that the unit trade-in subsidy is low and the salvage of the used product is high. Practical implications These results provide managerial insights for the manufacturer and the third party to make decisions in the field of recycling. Originality/value This paper is among the first papers to study the competition between trade-in program and third party’s collecting program under government’s trade-in subsidy policy. Moreover, this paper presents the conditions under which the manufacturer should authorize or not authorize the third party to collect its used products.


Legal Studies ◽  
1981 ◽  
Vol 1 (3) ◽  
pp. 287-295
Author(s):  
P.J. Davies

It is commonplace in the commercial world for contractual obligations to be performed by persons other than the original parties to the contract. Because of the doctrine of privity of contract persons who are not party to a contract generally cannot take advantage of terms contained in it. If, therefore, a person undertakhg the performance of obligations which someone else has originally assumed misperforms those tasks so as to incur legal liability towards the other original contracting party, it would seem that he cannot rely on a protecting clause in the contract even though that clause may purport to afford him cover. A variety of avenues of escape from this situation (which is often commerically inconvenient) have been at various times advocated: the doctrine of vicarious immunity and the trust idea have been explored and eventually rejected. Other methods of avoidance retain more vigour: we have probably not heard the last of arguments based on the doctrines of volenti non fit injuria and disclaimer, of the bailment on terms and of the idea of spelling out a separate contract (or offer) between the party now suing and the third party.


2017 ◽  
Vol 111 (2) ◽  
pp. 219-236 ◽  
Author(s):  
ROBERT POWELL

Third parties often have a stake in the outcome of a conflict and can affect that outcome by taking sides. This article studies the factors that affect a third party's decision to take sides in a civil or interstate war by adding a third actor to a standard continuous-time war of attrition with two-sided asymmetric information. The third actor has preferences over which of the other two actors wins and for being on the winning side conditional on having taken sides. The third party also gets a flow payoff during the fighting which can be positive when fighting is profitable or negative when fighting is costly. The article makes four main contributions: First, it provides a formal framework for analyzing the effects of endogenous intervention on the duration and outcome of the conflict. Second, it identifies a “boomerang” effect that tends to make alignment decisions unpredictable and coalitions dynamically unstable. Third, it yields several clear comparative-static results. Finally, the formal analysis has implications for empirical efforts to estimate the effects of intervention, showing that there may be significant selection and identification issues.


2015 ◽  
Vol 20 (1) ◽  
pp. 59-72 ◽  
Author(s):  
Dean G. Pruitt

Except when there is substantial third-party pressure for settlement, participants in intractable conflict will only enter negotiation if they are motivated to end the conflict and optimistic about negotiation’s chances of success. The sources of such optimism are explored using case material from three intractable interethnic conflicts that were ultimately resolved by negotiation. In all three cases, optimism developed during prenegotiation communication between the parties. Also there were two main channels of communication, each channel providing credibility to the other and serving as a back-up if the other failed. In two of the cases the communication was face-to-face and friendly, but in the third it was distant and mediated by a chain of two intermediaries. A possible reason for this difference is that the parties were positively interdependent in the first two cases but not in the third. The paper concludes with a summary of three psychological experiments that demonstrate the impact of positive vs. negative interdependence.


2022 ◽  
Vol 10 (1) ◽  
pp. 168-181
Author(s):  
Ericbert Tambou Kamgue

Levinasian philosophy is characterized as a philosophy of ethical subjectivity and asymmetrical responsibility. Ethics is understood as the subject that gives itself entirely to the Other. However, the Other is never alone. His face attests to the presence of a third party who, looking at me in his eyes, cries for justice. There is no longer any question for the subject to devote himself entirely to the Other (ethical justice), to give everything to him at the risk of appearing empty-handed before the third party. How then to serve both the Other and the third party? The question of the political appears in the thought of Levinas with the emergence of the third party who, like the Other, challenges me and commands me (social justice). The third party establishes a political space. Politics is in the final analysis the place of the universalization of the ethical requirement born from face-to-face with the face of the Other.


Author(s):  
Hannah McCarthy

This chapter tackles guarantee or bond, which has no definitive judicial definition but is widely held to be a contract in which the guarantor agrees to be answerable for the debt or default of another to a third party. It cites the primary obligation of a third party that is underwritten by the guarantor as an essential characteristic of a guarantee. It also explains how the guarantor becomes answerable for the faults of the third party. This chapter talks about the indemnitor that undertakes a primary liability to another party in order to indemnify the other party against a specific event, which may or may not involve the act or default of a third party. It points out that the indemnity contained in construction sub-contracts is the most frequently used form of indemnity in the construction industry.


Al-MAJAALIS ◽  
2020 ◽  
Vol 7 (2) ◽  
pp. 69-102
Author(s):  
Anas Burhanuddin

Muamalat (transactions or dealings) is a quarter of the fiqh chapter besides worship, munakahah (marriage) and jinayah chapters. Another perspective, muamalah is half fiqh; because munakahah and jinayah can be put under muamalah. Showing the urgency of the muamalah chapter is being half of the religion. On the other hand, the rules “Basically, the Command Means Obligatory, Unless The Postulate Shows Other Things” is one of the most important rules in ushl al-fiqh. This study examines this rule and its application in the Muamalah chapter. The research method used is a qualitative with a theory implementation approach. The data sources are the books of ushlal-fiqh, fiqh, interpretation, hadith and Arabic. Data collection and analysis are done deductively. The most important results of this study are as follows: (1) The strongest opinion is that the command basically shows the obligation, unless the postulate transfers it to another meaning. (2) The ushuliyyah rules have enough examples of application in the muamalah chapter, such as: a. Basically the order means mandatory while there is no postulate that diverts it to other meanings, for example the order to return the slave brothers who are sold separately, the order to determine the size of the salam commodity, the order to return goods borrowed and deposited, and the order to sell similar ribawi commodities in tamatsul (such as in the dose or the scales) and taqabud (cash). b. The orders change meaning to sunnah or other meanings if there is a postulate that diverts them to these other meanings. For example, orders to bring witnesses in a sale and purchase transaction, waqf orders, and orders to record debts and credit. (3) Sometimes there are different points of view in understanding the meaning of the command, and whether there is a postulate that diverts it from the meaning of mandatory. For example, the order to take and announce the finding (luqathah) and the order to accept the transfer of receivables to third parties, if the third party is rich (liquid).


Author(s):  
Graham Virgo

This chapter examines the personal liability of third parties when there is a breach of trust or breach of fiduciary duty. It explains that there are two types of personal liability of third parties. One is receipt-based liability when a third party has received property in which the beneficiary or principal has an equitable proprietary interest and the other is accessorial liability when the third party has encouraged or assisted a breach of a trust or fiduciary duty. The elements of different causes of action relevant to receipt-based liability and accessorial liability are examined, notably the action for unconscionable receipt and the action of dishonest assistance. The controversial question of whether liability should be strict or fault-based is considered and, if the latter, the nature of the fault requirement.


2017 ◽  
Vol 82 ◽  
pp. 56-64 ◽  
Author(s):  
Wenting Shen ◽  
Jia Yu ◽  
Hui Xia ◽  
Hanlin Zhang ◽  
Xiuqing Lu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document