Sciweavers

1663 search results - page 76 / 333
» Privacy and Identity Management
Sort
View
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
15 years 11 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
16 years 4 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton
JLBS
2007
75views more  JLBS 2007»
15 years 4 months ago
Designing privacy-aware mobility pricing systems based on user perspective
Mobility-pricing is one of the avenues leading to the information highway. Using a combination of positioning, communication and information processing, automobile insurance can b...
Muhammad Usman Iqbal, Samsung Lim
ICC
2009
IEEE
171views Communications» more  ICC 2009»
15 years 2 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
IAT
2008
IEEE
15 years 10 months ago
Obligations with Deadlines and Maintained Interdictions in Privacy Regulation Frameworks
We aim at providing artificial agents with logical tools to reason specifically on privacy-related regulations, in order to comply with them. In order to express these regulatio...
Guillaume Piolle, Yves Demazeau