Sciweavers

382 search results - page 13 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
WPES
2005
ACM
14 years 1 months ago
Determining user privacy preferences by asking the right questions: an automated approach
As the Internet becomes increasingly used for sensitive transactions, the need to protect user privacy becomes more and more important. One fundamental aspect of user privacy is t...
Keith Irwin, Ting Yu
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 5 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
ACSAC
2010
IEEE
13 years 5 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
PPNA
2011
13 years 2 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
CSFW
2002
IEEE
14 years 18 days ago
A Privacy Policy Model for Enterprises
Privacy is an increasing concern in the marketplace. Although enterprises promise sound privacy practices to their customers, there is no technical mechanism to enforce them inter...
Günter Karjoth, Matthias Schunter