Sciweavers

98 search results - page 11 / 20
» Privacy Management for Context Transponders
Sort
View
DMKD
2004
ACM
115views Data Mining» more  DMKD 2004»
14 years 3 months ago
Privacy-preserving data integration and sharing
Integrating data from multiple sources has been a longstanding challenge in the database community. Techniques such as privacy-preserving data mining promises privacy, but assume ...
Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gun...
CSCW
2011
ACM
13 years 5 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
IJWIN
2006
119views more  IJWIN 2006»
13 years 10 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
DIM
2007
ACM
14 years 2 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
LISA
2004
13 years 11 months ago
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
Spyware is a rapidly spreading problem for PC users causing significant impact on system stability and privacy concerns. It attaches to extensibility points in the system to ensur...
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron...