Sciweavers

119 search results - page 21 / 24
» Self Protecting Data for De-perimeterised Information Sharin...
Sort
View
COMSNETS
2012
183views more  COMSNETS 2012»
12 years 4 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
PODS
2012
ACM
244views Database» more  PODS 2012»
11 years 11 months ago
A rigorous and customizable framework for privacy
In this paper we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized t...
Daniel Kifer, Ashwin Machanavajjhala
WWW
2005
ACM
14 years 9 months ago
Finding group shilling in recommendation system
In the age of information explosion, recommendation system has been proved effective to cope with information overload in ecommerce area. However, unscrupulous producers shill the...
Xue-Feng Su, Hua-Jun Zeng, Zheng Chen
SRDS
2010
IEEE
13 years 6 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
BMCBI
2010
193views more  BMCBI 2010»
13 years 8 months ago
caGrid Workflow Toolkit: A Taverna based workflow tool for cancer Grid
Background: In biological and medical domain, the use of web services made the data and computation functionality accessible in a unified manner, which helped automate the data pi...
Wei Tan, Ravi K. Madduri, Aleksandra Nenadic, Stia...