Sciweavers

861 search results - page 40 / 173
» Ranking Privacy Policy
Sort
View
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
15 years 8 months ago
Realizing Privacy-Preserving Features in Hippocratic Databases
Preserving privacy has become a crucial requirement for operating a business that manages personal data. Hippocratic databases have been proposed to answer this requirement throug...
Yasin Laura-Silva, Walid G. Aref
ICASSP
2011
IEEE
14 years 8 months ago
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
A rechargeable battery may be used to partially protect the privacy of information contained in a household’s electrical load profile. We represent the system as a finite stat...
David P. Varodayan, Ashish Khisti
TDP
2008
96views more  TDP 2008»
15 years 4 months ago
Constrained Microaggregation: Adding Constraints for Data Editing
Privacy preserving data mining and statistical disclosure control have introduced several methods for data perturbation that can be used for ensuring the privacy of data respondent...
Vicenç Torra
CCS
2008
ACM
15 years 6 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
116
Voted
SIGIR
2009
ACM
15 years 11 months ago
The impact of crawl policy on web search effectiveness
Crawl selection policy has a direct influence on Web search effectiveness, because a useful page that is not selected for crawling will also be absent from search results. Yet th...
Dennis Fetterly, Nick Craswell, Vishwa Vinay