Sciweavers

2272 search results - page 129 / 455
» Provable Data Privacy
Sort
View
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
14 years 10 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
DIM
2006
ACM
14 years 3 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
INFOCOM
2011
IEEE
13 years 1 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
PROVSEC
2009
Springer
14 years 3 months ago
Self-enforcing Private Inference Control
Private inference control enables simultaneous enforcement of inference control and protection of users’ query privacy. Private inference control is a useful tool for database ap...
Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zho...
ISI
2004
Springer
14 years 2 months ago
The Architecture of the Cornell Knowledge Broker
Intelligence applications have to process massive amounts of data in order to extract relevant information. This includes archived historical data as well as continuously arriving ...
Alan J. Demers, Johannes Gehrke, Mirek Riedewald