Sciweavers

382 search results - page 41 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
13 years 9 months ago
Towards Attack-Resilient Geometric Data Perturbation
Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are no...
Keke Chen, Gordon Sun, Ling Liu
DAIS
2007
13 years 9 months ago
The Context-Dependent Role Model
Implementing context-dependent behaviour of pervasive computing applications puts a great burden on programmers: Devices need to continuously adapt not only to their own context, b...
Jorge Vallejos, Peter Ebraert, Brecht Desmet, Tom ...
JCP
2006
135views more  JCP 2006»
13 years 7 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
CCS
2008
ACM
13 years 9 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
ISI
2006
Springer
13 years 7 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi