Sciweavers

1779 search results - page 91 / 356
» A Formal Model of Data Privacy
Sort
View
CCS
2009
ACM
15 years 11 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
AAAI
2010
15 years 5 months ago
Multi-Agent Plan Recognition: Formalization and Algorithms
Multi-Agent Plan Recognition (MAPR) seeks to identify the dynamic team structures and team behaviors from the observations of the activity-sequences of a set of intelligent agents...
Bikramjit Banerjee, Landon Kraemer, Jeremy Lyle
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 3 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
IEEEARES
2008
IEEE
15 years 10 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
STOC
2007
ACM
112views Algorithms» more  STOC 2007»
16 years 4 months ago
Smooth sensitivity and sampling in private data analysis
We introduce a new, generic framework for private data analysis. The goal of private data analysis is to release aggregate information about a data set while protecting the privac...
Kobbi Nissim, Sofya Raskhodnikova, Adam Smith