Sciweavers

478 search results - page 42 / 96
» Privacy and pricing personal information
Sort
View
MOBISYS
2008
ACM
14 years 8 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
PVLDB
2008
101views more  PVLDB 2008»
13 years 8 months ago
Output perturbation with query relaxation
Given a dataset containing sensitive personal information, a statistical database answers aggregate queries in a manner that preserves individual privacy. We consider the problem ...
Xiaokui Xiao, Yufei Tao
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 11 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
GROUP
2005
ACM
14 years 2 months ago
Uncovering privacy attitudes and practices in instant messaging
We present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7point Likert scale, the reported concern about ...
Sameer Patil, Alfred Kobsa
CHI
2010
ACM
14 years 1 months ago
Moving beyond untagging: photo privacy in a tagged world
Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each pers...
Andrew Besmer, Heather Richter Lipford