Sciweavers

5255 search results - page 131 / 1051
» Formal Methods for Privacy
Sort
View
129
Voted
EDBT
2009
ACM
200views Database» more  EDBT 2009»
15 years 9 months ago
Continuous privacy preserving publishing of data streams
Recently, privacy preserving data publishing has received a lot of attention in both research and applications. Most of the previous studies, however, focus on static data sets. I...
Bin Zhou 0002, Yi Han, Jian Pei, Bin Jiang, Yufei ...
128
Voted
CHI
2005
ACM
16 years 3 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
126
Voted
AI
2008
Springer
15 years 9 months ago
Finding Topics in Email Using Formal Concept Analysis and Fuzzy Membership Functions
In this paper, we present a method to identify topics in email messages. The formal concept analysis is adopted as a semantic analysis method to group emails containing the same ke...
Liqiang Geng, Larry Korba, Yunli Wang, Xin Wang, Y...
133
Voted
SDMW
2004
Springer
15 years 8 months ago
Achieving Privacy Preservation when Sharing Data for Clustering
Abstract. In this paper, we address the problem of protecting the underlying attribute values when sharing data for clustering. The challenge is how to meet privacy requirements an...
Stanley R. M. Oliveira, Osmar R. Zaïane
160
Voted
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 6 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...