Sciweavers

96 search results - page 4 / 20
» On provenance and privacy
Sort
View
EDBT
2008
ACM
144views Database» more  EDBT 2008»
14 years 7 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta
HUC
2003
Springer
14 years 20 days ago
The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness
Traditional techniques for balancing privacy and awareness in video media spaces, like blur filtration, have been proven to be ineffective for compromising home situations involvin...
Carman Neustaedter, Saul Greenberg
ASIACRYPT
2000
Springer
13 years 11 months ago
The Security of Chaffing and Winnowing
This paper takes a closer look at Rivest's chaffing-and-winnowing paradigm for data privacy. We begin with a definition which enables one to clearly determine whether a given ...
Mihir Bellare, Alexandra Boldyreva
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
13 years 8 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton
ACSAC
1996
IEEE
13 years 11 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber