Sciweavers

2217 search results - page 140 / 444
» A Data Privacy Taxonomy
Sort
View
138
Voted
PUC
2010
84views more  PUC 2010»
15 years 2 months ago
Information privacy in institutional and end-user tracking and recording technologies
This paper presents an analysis of attitudes towards everyday tracking and recording technologies (e.g., credit cards, store loyalty cards, store video cameras). This work focuses ...
David H. Nguyen, Gillian R. Hayes
153
Voted
PERCOM
2011
ACM
14 years 7 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
157
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
145
Voted
AAAI
2011
14 years 3 months ago
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models
With smart-phones becoming increasingly commonplace, there has been a subsequent surge in applications that continuously track the location of users. However, serious privacy conc...
Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh
142
Voted
COMSNETS
2012
183views more  COMSNETS 2012»
13 years 11 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz