Sciweavers

738 search results - page 81 / 148
» Privacy Protection for Speech Information
Sort
View
WIKIS
2010
ACM
13 years 7 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
AAMAS
2007
Springer
13 years 9 months ago
An agent architecture for multi-attribute negotiation using incomplete preference information
A component-based generic agent architecture for multi-attribute (integrative) negotiation is introduced and its application is described in a prototype system for negotiation abo...
Catholijn M. Jonker, Valentin Robu, Jan Treur
CCS
2010
ACM
13 years 9 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
CSFW
1992
IEEE
14 years 1 months ago
Causal Security
This paper gives a new definition of Security, which takes causal information into account. The new definition can be used to determine the security of nondeterministic concurrent...
Miranda Mowbray
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 9 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta