Sciweavers

382 search results - page 38 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 5 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
IEEEARES
2010
IEEE
14 years 2 months ago
Formalization of Viruses and Malware Through Process Algebras
Abstract—Abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. Considering recent malware, these are only partially cov...
Grégoire Jacob, Eric Filiol, Hervé D...
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
11 years 10 months ago
Differentially private transit data publication: a case study on the montreal transportation system
With the wide deployment of smart card automated fare collection (SCAFC) systems, public transit agencies have been benefiting from huge volume of transit data, a kind of sequent...
Rui Chen, Benjamin C. M. Fung, Bipin C. Desai, N&e...
IVA
2009
Springer
14 years 2 months ago
A Socially-Aware Memory for Companion Agents
Abstract. Memory is a vital capability for intelligent social Companions. In this paper, we introduce a simple memory model that allows a Companion to maintain a long-term relation...
Mei Yii Lim, Ruth Aylett, Wan Ching Ho, Sibylle En...