Sciweavers

2272 search results - page 305 / 455
» Provable Data Privacy
Sort
View
CCS
2008
ACM
13 years 11 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
PERCOM
2007
ACM
14 years 9 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
EUSAI
2007
Springer
14 years 3 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
HUC
2003
Springer
14 years 2 months ago
liquid: Context-Aware Distributed Queries
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...
BNCOD
2008
88views Database» more  BNCOD 2008»
13 years 11 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao