Sciweavers

211 search results - page 9 / 43
» Privacy Protected Query Processing on Spatial Networks
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 9 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
EDBT
2012
ACM
255views Database» more  EDBT 2012»
11 years 9 months ago
Top-k spatial keyword queries on road networks
With the popularization of GPS-enabled devices there is an increasing interest for location-based queries. In this context, one interesting problem is processing top-k spatial key...
João B. Rocha-Junior, Kjetil Nørv&ar...
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
13 years 11 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
14 years 1 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu