Sciweavers

184 search results - page 34 / 37
» A TMDM Disclosure Using T
Sort
View
CHI
2003
ACM
14 years 7 months ago
Unpacking "privacy" for a networked world
Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settin...
Leysia Palen, Paul Dourish
IEEEARES
2006
IEEE
14 years 1 months ago
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine
Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as...
Nevena Stolba, Marko Banek, A. Min Tjoa
WPES
2006
ACM
14 years 1 months ago
Revisiting the uniqueness of simple demographics in the US population
According to a famous study [10] of the 1990 census data, 87% of the US population can be uniquely identified by gender, ZIP code and full date of birth. This short paper revisit...
Philippe Golle
INFOCOM
2005
IEEE
14 years 1 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...
CCS
2003
ACM
14 years 22 days ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna