Sciweavers

738 search results - page 10 / 148
» Privacy Protection for Speech Information
Sort
View
CHI
2009
ACM
14 years 2 months ago
Tagged photos: concerns, perceptions, and protections
Photo sharing has become a popular feature of many online social networking sites. Many of the photo sharing applications on these sites, allow users to annotate photos with those...
Andrew Besmer, Heather Richter Lipford
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 8 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
SEMWEB
2007
Springer
14 years 1 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
TMC
2008
159views more  TMC 2008»
13 years 6 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
IJISEC
2007
66views more  IJISEC 2007»
13 years 7 months ago
Protecting data privacy through hard-to-reverse negative databases
The paper extends the idea of negative representations of information for enhancing privacy. Simply put, a set DB of data elements can be represented in terms of its complement set...
Fernando Esponda, Elena S. Ackley, Paul Helman, Ha...