Sciweavers

2217 search results - page 183 / 444
» A Data Privacy Taxonomy
Sort
View
CCS
2010
ACM
15 years 2 months ago
Exploiting social networking sites for spam
In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...
IPAW
2010
15 years 1 months ago
Social Web-Scale Provenance in the Cloud
One of the biggest effects of Web 2.0 and the evolution of the social Web is the commoditization of data. The emergence of applications such as Facebook and Twitter, have lowered t...
Yogesh Simmhan, Karthik Gomadam
MOC
2010
14 years 10 months ago
On interpolation by Planar cubic G2 pythagorean-hodograph spline curves
In this paper, the geometric interpolation of planar data points and boundary tangent directions by a cubic G2 Pythagorean-hodograph (PH) spline curve is studied. It is shown, that...
Gasper Jaklic, Jernej Kozak, Marjeta Krajnc, Vito ...
SIGMOD
2006
ACM
96views Database» more  SIGMOD 2006»
16 years 4 months ago
Injecting utility into anonymized datasets
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
Daniel Kifer, Johannes Gehrke
ASIACRYPT
2000
Springer
15 years 7 months ago
The Security of Chaffing and Winnowing
This paper takes a closer look at Rivest's chaffing-and-winnowing paradigm for data privacy. We begin with a definition which enables one to clearly determine whether a given ...
Mihir Bellare, Alexandra Boldyreva