Sciweavers

2272 search results - page 109 / 455
» Provable Data Privacy
Sort
View
CCS
2011
ACM
12 years 8 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
14 years 2 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 8 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
14 years 2 months ago
People Identification with Limited Labels in Privacy-Protected Video
People identification is an essential task for video content analysis in a surveillance system. A good classifier, however, requires a large amount of training data, which may not...
Yi Chang, Rong Yan, Datong Chen, Jie Yang
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
14 years 1 months ago
Advanced Metadata for Privacy-Aware Representation of Credentials
Semantic Web languages like OWL and RDFS promise to be viable means for representing metadata describing users and resources available over the Internet. Recently, interest has be...
Paolo Ceravolo, Ernesto Damiani, Sabrina De Capita...