Sciweavers

1663 search results - page 88 / 333
» Privacy and Identity Management
Sort
View
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
16 years 5 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal
WWW
2007
ACM
16 years 5 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
DIM
2008
ACM
15 years 6 months ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
ISI
2006
Springer
15 years 4 months ago
Personal Information Management (PIM) for Intelligence Analysis
The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are rele...
Antonio Badia
CHI
2003
ACM
16 years 4 months ago
Who wants to know what when? privacy preference determinants in ubiquitous computing
We conducted a questionnaire-based study of the relative importance of two factors, inquirer and situation, in determining the preferred accuracy of personal information disclosed...
Scott Lederer, Jennifer Mankoff, Anind K. Dey