Sciweavers

3272 search results - page 50 / 655
» Privacy in Data Publishing
Sort
View
ACSAC
2003
IEEE
15 years 10 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
15 years 2 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
ICDE
2005
IEEE
170views Database» more  ICDE 2005»
16 years 6 months ago
Data Privacy through Optimal k-Anonymization
Roberto J. Bayardo Jr., Rakesh Agrawal
IJMMS
2007
75views more  IJMMS 2007»
15 years 4 months ago
Internet users' perceptions of 'privacy concerns' and 'privacy actions'
A consistent finding reported in online privacy research is that an overwhelming majority of people are ‘concerned’ about their privacy when they use the Internet. Therefore,...
Carina Paine, Ulf-Dietrich Reips, Stefan Stieger, ...
SIGECOM
1999
ACM
125views ECommerce» more  SIGECOM 1999»
15 years 9 months ago
Privacy in e-commerce: examining user scenarios and privacy preferences
Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, b...
Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reag...