Sciweavers

3299 search results - page 32 / 660
» Privacy and Trusted Computing
Sort
View
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
ICEB
2004
175views Business» more  ICEB 2004»
13 years 10 months ago
Privacy-Preserving Collaborative Association Rule Mining
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among parties i...
Justin Z. Zhan, Stan Matwin, Nathalie Japkowicz, L...
PET
2010
Springer
14 years 18 days ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
ITIIS
2010
150views more  ITIIS 2010»
13 years 7 months ago
Computational Trust and Its Impact over Rational Purchasing Decisions of Internet Users
As web-based online communities are rapidly growing, the agents in the communities need to know their measurable belief of trust for safe and successful interactions. In this pape...
Sanguk Noh
WMCSA
2008
IEEE
14 years 3 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...