Sciweavers

VTC
2010
IEEE
167views Communications» more  VTC 2010»
13 years 6 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
TRUSTBUS
2010
Springer
13 years 6 months ago
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression
We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging so...
Javier Parra-Arnau, David Rebollo-Monedero, Jordi ...
TRUSTBUS
2010
Springer
13 years 6 months ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen
TKDE
2010
164views more  TKDE 2010»
13 years 6 months ago
PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
—Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a privacy-aware monitoring (PAM) framework that addresses both issues. The fra...
Haibo Hu, Jianliang Xu, Dik Lun Lee
TISSEC
2010
121views more  TISSEC 2010»
13 years 6 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
TISSEC
2010
72views more  TISSEC 2010»
13 years 6 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
SDMW
2010
Springer
13 years 7 months ago
Joining Privately on Outsourced Data
In an outsourced database framework, clients place data management with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients ar...
Bogdan Carbunar, Radu Sion
PVLDB
2010
121views more  PVLDB 2010»
13 years 7 months ago
Personalized Privacy Protection in Social Networks
Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background...
Mingxuan Yuan, Lei Chen 0002, Philip S. Yu
PVLDB
2010
65views more  PVLDB 2010»
13 years 7 months ago
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data
The principle of anonymization for data sharing has become a very popular paradigm for the preservation of privacy of the data sub
Graham Cormode, Ninghui Li, Tiancheng Li, Divesh S...
PVLDB
2010
179views more  PVLDB 2010»
13 years 7 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...