Sciweavers

2217 search results - page 171 / 444
» A Data Privacy Taxonomy
Sort
View
VLDB
2002
ACM
147views Database» more  VLDB 2002»
15 years 3 months ago
Hippocratic Databases
The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibi...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 9 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
COMPUTER
2002
89views more  COMPUTER 2002»
15 years 3 months ago
A Pattern for Softcoded Values
rs use models or abstractions that hide low-level implementation details. Various kinds of representations such as data models, state-transition models, and dataflow models can hel...
Michael R. Blaha, Cheryl Smith
126
Voted
IVS
2006
127views more  IVS 2006»
15 years 3 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
PVLDB
2008
146views more  PVLDB 2008»
15 years 3 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...