Sciweavers

SOUPS
2009
ACM
14 years 6 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
SOUPS
2009
ACM
14 years 6 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
UM
2009
Springer
14 years 6 months ago
Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites
Abstract. Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, we proposed a dynamic privacy-enhancing user modeli...
Yang Wang 0005, Alfred Kobsa
MIDDLEWARE
2009
Springer
14 years 6 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
MDAI
2009
Springer
14 years 6 months ago
The Functionality-Security-Privacy Game
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achi...
Josep Domingo-Ferrer
FC
2009
Springer
121views Cryptology» more  FC 2009»
14 years 6 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
FC
2009
Springer
150views Cryptology» more  FC 2009»
14 years 6 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
DRM
2009
Springer
14 years 6 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacri...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
CIKM
2009
Springer
14 years 6 months ago
Applying differential privacy to search queries in a policy based interactive framework
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Palanivel Balaji Kodeswaran, Evelyne Viegas
ICDM
2009
IEEE
143views Data Mining» more  ICDM 2009»
14 years 6 months ago
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...