Sciweavers

30 search results - page 4 / 6
» A Theorem on Sensitivity and Applications in Private Computa...
Sort
View
WISEC
2010
ACM
14 years 1 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
ATAL
2007
Springer
14 years 2 months ago
On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values
In a dynamic market, being able to update one’s value based on information available to other bidders currently in the market can be critical to having profitable transactions. ...
Florin Constantin, David C. Parkes
ICFP
2010
ACM
13 years 9 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
PERCOM
2011
ACM
12 years 11 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...