Sciweavers

1906 search results - page 52 / 382
» Data Privacy
Sort
View
CSE
2009
IEEE
15 years 9 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
114
Voted
COMAD
2008
15 years 4 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
EDBT
2008
ACM
144views Database» more  EDBT 2008»
16 years 2 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta
133
Voted
NSDI
2010
15 years 4 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
102
Voted
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
15 years 4 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri