Sciweavers

1779 search results - page 167 / 356
» A Formal Model of Data Privacy
Sort
View
125
Voted
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
15 years 2 months ago
Anonymizing Temporal Data
-- Temporal data are time-critical in that the snapshot at each timestamp must be made available to researchers in a timely fashion. However, due to the limited data, each snapshot...
Ke Wang, Yabo Xu, Raymond Chi-Wing Wong, Ada Wai-C...
117
Voted
GMP
2006
IEEE
117views Solid Modeling» more  GMP 2006»
15 years 10 months ago
Two-Dimensional Selections for Feature-Based Data Exchange
Proper treatment of selections is essential in parametric feature-based design. Data exchange is one of the most important operators in any design paradigm. In this paper we addre...
Ari Rappoport, Steven N. Spitz, Michal Etzion
BIRTHDAY
2010
Springer
15 years 3 months ago
Specifying and Verifying Organizational Security Properties in First-Order Logic
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell–La Padula. We show t...
Christoph Brandt, Jens Otten, Christoph Kreitz, Wo...
CHI
2009
ACM
16 years 5 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...
POST
2012
218views more  POST 2012»
14 years 7 days ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...