Sciweavers

69 search results - page 8 / 14
» A General Proximity Privacy Principle
Sort
View
KDD
2012
ACM
257views Data Mining» more  KDD 2012»
11 years 9 months ago
Aggregating web offers to determine product prices
Historical prices are important information that can help consumers decide whether the time is right to buy a product. They provide both a context to the users, and facilitate the...
Rakesh Agrawal, Samuel Ieong
ESORICS
2004
Springer
14 years 23 days ago
Redundancy and Diversity in Security
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
Bev Littlewood, Lorenzo Strigini
ISI
2008
Springer
13 years 7 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
CSFW
2006
IEEE
14 years 1 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
TIS
2002
74views more  TIS 2002»
13 years 7 months ago
Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness
: Modern information systems not only capture a seemingly endless amount of transactional data, but also tend to retain it for indefinite periods of time. We argue that privacy pol...
Jean-François Blanchette, Deborah G. Johnso...