Sciweavers

5255 search results - page 100 / 1051
» Formal Methods for Privacy
Sort
View
CCS
2011
ACM
12 years 10 months ago
Trace equivalence decision: negative tests and non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
SAFECOMP
1998
Springer
14 years 2 months ago
EURIS, a Specification Method for Distributed Interlockings
Abstract. Safety systems for railways have shifted from electronic relays to more computer-oriented approaches. This article highlights the language EURIS from NS Railinfrabeheer, ...
Fokko van Dijk, Wan Fokkink, Gea Kolk, Paul van de...
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
14 years 10 months ago
Privacy Preserving OLAP
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
Rakesh Agrawal, Ramakrishnan Srikant, Dilys Thomas
MDM
2009
Springer
102views Communications» more  MDM 2009»
14 years 4 months ago
Privacy-Aware Proximity Based Services
Proximity based services are location based services (LBS) in which the service adaptation depends on the comparison between a given threshold value and the distance between a use...
Sergio Mascetti, Claudio Bettini, Dario Freni, Xia...
APWEB
2006
Springer
14 years 1 months ago
Implementing Privacy Negotiations in E-Commerce
This paper examines how service providers may resolve the trade-off between their personalization efforts and users' individual privacy concerns. We analyze how negotiation te...
Sören Preibusch