Sciweavers

SAJ
2002
97views more  SAJ 2002»
13 years 11 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
CI
2004
76views more  CI 2004»
13 years 11 months ago
Negotiating Exchanges of P3p-Labeled Information for Compensation
We consider private information a commodity, of value to both the information holder and the information seeker. Hence, a customer can be enticed to trade his/her private informati...
Scott Buffett, Keping Jia, Sandy Liu, Bruce Spence...
JLP
2007
98views more  JLP 2007»
13 years 11 months ago
Tempus fugit: How to plug it
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of thi...
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,...
SIGECOM
2008
ACM
144views ECommerce» more  SIGECOM 2008»
13 years 11 months ago
Incentives for expressing opinions in online polls
Prediction markets efficiently extract and aggregate the private information held by individuals about events and facts that can be publicly verified. However, facts such as the e...
Radu Jurca, Boi Faltings
JAIR
2008
104views more  JAIR 2008»
13 years 11 months ago
M-DPOP: Faithful Distributed Implementation of Efficient Social Choice Problems
In the efficient social choice problem, the goal is to assign values, subject to side constraints, to a set of variables to maximize the total utility across a population of agent...
Adrian Petcu, Boi Faltings, David C. Parkes
AI
2003
Springer
14 years 4 months ago
Negotiating Exchanges of Private Information for Web Service Eligibility
Private information about individuals that engage in e-commerce business transactions is of economic value to businesses for market analysis and for identifying possible future par...
Keping Jia, Bruce Spencer
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
14 years 5 months ago
Electronic Markets for Private Information: Economic and Security Considerations
Technological advances in the collection, storage and analysis of data have increased the ease with which businesses can make profitable use of information about individuals. Som...
Ram Gopal L., Robert S. Garfinkel, Manuel A. Nunez...
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
14 years 5 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
SAGT
2009
Springer
108views Game Theory» more  SAGT 2009»
14 years 5 months ago
On the Planner's Loss Due to Lack of Information in Bayesian Mechanism Design
In this paper we study a large class of resource allocation problems with an important complication, the utilization cost of a given resource is private information of a profit ma...
José R. Correa, Nicolas Figueroa