Sciweavers

2272 search results - page 141 / 455
» Provable Data Privacy
Sort
View
SAC
2005
ACM
14 years 3 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
CRYPTO
2004
Springer
91views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Privacy-Preserving Datamining on Vertically Partitioned Databases
In a recent paper Dinur and Nissim considered a statistical database in which a trusted database administrator monitors queries and introduces noise to the responses with the goal ...
Cynthia Dwork, Kobbi Nissim
JCP
2007
148views more  JCP 2007»
13 years 10 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy
TSE
2008
128views more  TSE 2008»
13 years 10 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
PUC
2010
84views more  PUC 2010»
13 years 8 months ago
Information privacy in institutional and end-user tracking and recording technologies
This paper presents an analysis of attitudes towards everyday tracking and recording technologies (e.g., credit cards, store loyalty cards, store video cameras). This work focuses ...
David H. Nguyen, Gillian R. Hayes