Sciweavers

2272 search results - page 159 / 455
» Provable Data Privacy
Sort
View
ACMICEC
2003
ACM
90views ECommerce» more  ACMICEC 2003»
14 years 3 months ago
Automated analysis of P3P-enabled Web sites
The Platform for Privacy Preferences (P3P) provides a standard computer-readable format for privacy policies and a protocol that enables web browsers to read and process these pol...
Simon Byers, Lorrie Faith Cranor, David P. Kormann
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
14 years 4 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
EDBT
2009
ACM
128views Database» more  EDBT 2009»
14 years 2 months ago
HIDE: heterogeneous information DE-identification
While there is an increasing need to share data that may contain personal information, such data sharing must preserve individual privacy without disclosing any identifiable infor...
James J. Gardner, Li Xiong, Kanwei Li, James J. Lu
HUC
2010
Springer
13 years 11 months ago
Exploring end user preferences for location obfuscation, location-based services, and the value of location
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can revea...
A. J. Bernheim Brush, John Krumm, James Scott
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
14 years 11 months ago
Algorithms for discovering bucket orders from data
Ordering and ranking items of different types are important tasks in various applications, such as query processing and scientific data mining. A total order for the items can be ...
Aristides Gionis, Heikki Mannila, Kai Puolamä...