Sciweavers

208 search results - page 9 / 42
» Computing Anonymously with Arbitrary Knowledge
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 7 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
MOBICOM
2010
ACM
13 years 10 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
14 years 1 days ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
PODC
2011
ACM
13 years 27 days ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
CSFW
2011
IEEE
12 years 9 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...