Sciweavers

320 search results - page 10 / 64
» Securing history: Privacy and accountability in database sys...
Sort
View
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
14 years 8 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
14 years 29 days ago
Public Attitudes towards a National Identity "Smart Card: " Privacy and Security Concerns
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Brille
GIS
2008
ACM
14 years 8 months ago
Mining user similarity based on location history
The pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enable people to conveniently log the location histories they visited with spatio-temporal data. T...
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu ...
TRUSTBUS
2009
Springer
14 years 2 months ago
An Anonymous Credit Card System
Abstract. Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to mon...
Elli Androulaki, Steven M. Bellovin
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu