Sciweavers

2272 search results - page 104 / 455
» Provable Data Privacy
Sort
View
WWW
2009
ACM
14 years 8 months ago
Privacy diffusion on the web: a longitudinal perspective
For the last few years we have studied the diffusion of private information about users as they visit various Web sites triggering data gathering aggregation by third parties. Thi...
Balachander Krishnamurthy, Craig E. Wills
NORDICHI
2006
ACM
14 years 2 months ago
How ordinary internet users can have a chance to influence privacy policies
By ‘Obligation Management’ we refer to the definition, automated enforcement, and monitoring of privacy obligation policies. Privacy policies are nowadays found on most organi...
John Sören Pettersson, Simone Fischer-Hü...
FOCS
2010
IEEE
13 years 6 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
CCS
2007
ACM
14 years 2 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
KDD
2002
ACM
128views Data Mining» more  KDD 2002»
14 years 8 months ago
Privacy preserving mining of association rules
We present a framework for mining association rules from transactions consisting of categorical items where the data has been randomized to preserve privacy of individual transact...
Alexandre V. Evfimievski, Ramakrishnan Srikant, Ra...