Sciweavers

2217 search results - page 137 / 444
» A Data Privacy Taxonomy
Sort
View
120
Voted
EDBTW
2010
Springer
15 years 10 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
123
Voted
UM
2009
Springer
15 years 10 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
118
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
150
Voted
PDCAT
2007
Springer
15 years 9 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
128
Voted
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
15 years 9 months ago
SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing
The trend towards outsourcing increases the number of documents stored at external service providers. This storage model, however, raises privacy and security concerns because the...
Michael Schrefl, Katharina Grün, Jürgen ...