Sciweavers

3299 search results - page 72 / 660
» Privacy and Trusted Computing
Sort
View
AGENTS
2000
Springer
14 years 12 days ago
Learning to Trust
Abstract. Evolutionary game-theory is a powerful tool to investigate the development of complex relations between individuals such as the emergence of cooperation and trust. But th...
Andreas Birk 0002
JTAER
2010
147views more  JTAER 2010»
13 years 7 months ago
Privacy Issues for Online Personal Photograph Collections
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...
Sally Jo Cunningham, Masood Masoodian, Anne Adams
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 9 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
14 years 1 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
POLICY
2009
Springer
14 years 3 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter