Sciweavers

3299 search results - page 620 / 660
» Privacy and Trusted Computing
Sort
View
CSE
2009
IEEE
13 years 6 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang
ICDCS
2009
IEEE
13 years 6 months ago
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases
The balance between privacy and utility is a classical problem with an increasing impact on the design of modern information systems. On the one side it is crucial to ensure that ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
BCSHCI
2009
13 years 6 months ago
Personality traits, usage patterns and information disclosure in online communities
Online communities of different types have become an important part of the daily internet life of many people within the last couple of years. Both research and business have show...
Johann Schrammel, Christina Köffel, Manfred T...
IAJIT
2011
13 years 3 months ago
Social Issues in wireless sensor networks with healthcare perspective
: The recent advances in Wireless Sensor Networks have given rise to many application areas in healthcare. It has produced new field of Wireless Body Area Networks. Using wearable ...
Moshaddique Al Ameen, Kyung Sup Kwak
TDSC
2011
13 years 3 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...