Sciweavers

382 search results - page 23 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
PST
2004
13 years 11 months ago
Supporting Privacy in E-Learning with Semantic Streams
The goal of the semantic web is to facilitate the exchange of meaningful information in a form that is easy for machines to process. The goal of an e-learning system is to support ...
Lori Kettel, Christopher A. Brooks, Jim E. Greer
VLDB
2005
ACM
135views Database» more  VLDB 2005»
14 years 3 months ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao
SICHERHEIT
2010
13 years 8 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
PERCOM
2008
ACM
13 years 10 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 4 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...