Sciweavers

2217 search results - page 109 / 444
» A Data Privacy Taxonomy
Sort
View
119
Voted
JNW
2007
102views more  JNW 2007»
15 years 3 months ago
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments
Abstract— A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Mana...
Lukasz Opyrchal, Atul Prakash, Amit Agrawal
153
Voted
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
15 years 1 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
15 years 10 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
149
Voted
DBSEC
2010
113views Database» more  DBSEC 2010»
15 years 3 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
114
Voted
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
15 years 9 months ago
People Identification with Limited Labels in Privacy-Protected Video
People identification is an essential task for video content analysis in a surveillance system. A good classifier, however, requires a large amount of training data, which may not...
Yi Chang, Rong Yan, Datong Chen, Jie Yang