Sciweavers

580 search results - page 27 / 116
» Security and privacy in a structured information network
Sort
View
INFOCOM
2011
IEEE
13 years 6 days ago
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin S...
CIKM
2009
Springer
14 years 3 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
ACSAC
2007
IEEE
14 years 3 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
ACSAC
2007
IEEE
14 years 3 months ago
An Overview of the Annex System
This paper describes the security and network architecture of the Annex system, a family of technologies for secure and pervasive communication and information processing that we ...
Duncan A. Grove, Toby C. Murray, C. A. Owen, Chris...
DMIN
2006
125views Data Mining» more  DMIN 2006»
13 years 10 months ago
Privacy-Preserving Bayesian Network Learning From Heterogeneous Distributed Data
In this paper, we propose a post randomization technique to learn a Bayesian network (BN) from distributed heterogeneous data, in a privacy sensitive fashion. In this case, two or ...
Jianjie Ma, Krishnamoorthy Sivakumar