Sciweavers

234 search results - page 20 / 47
» Composition and Generalization of Context Data for Privacy P...
Sort
View
SAC
2010
ACM
14 years 28 days ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
SACMAT
2005
ACM
14 years 1 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
ISI
2008
Springer
13 years 7 months ago
A framework for privacy-preserving cluster analysis
Abstract--Releasing person-specific data could potentially reveal sensitive information of individuals. k-anonymization is a promising privacy protection mechanism in data publishi...
Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad ...
MDM
2007
Springer
279views Communications» more  MDM 2007»
14 years 1 months ago
Anonymity in Location-Based Services: Towards a General Framework
A general consensus is that the proliferation of locationaware devices will result in a diffusion of location-based services. Privacy preservation is a challenging research issue ...
Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wa...
CSCW
2006
ACM
14 years 1 months ago
Context-aware telephony: privacy preferences and sharing patterns
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with cont...
Ashraf Khalil, Kay Connelly