Sciweavers

6 search results - page 1 / 2
» PEEP- An Information Extraction base approach for Privacy Pr...
Sort
View
CEAS
2005
Springer
14 years 4 months ago
PEEP- An Information Extraction base approach for Privacy Protection in Email
Narjès Boufaden, William Elazmeh, Yimin Ma,...
ACSAC
2007
IEEE
14 years 5 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
CCS
2009
ACM
14 years 5 months ago
Inferring privacy policies for social networking services
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
George Danezis
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 8 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
ITRUST
2005
Springer
14 years 4 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...