No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
We consider private information a commodity, of value to both the information holder and the information seeker. Hence, a customer can be enticed to trade his/her private informati...
Scott Buffett, Keping Jia, Sandy Liu, Bruce Spence...
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of thi...
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,...
Prediction markets efficiently extract and aggregate the private information held by individuals about events and facts that can be publicly verified. However, facts such as the e...
In the efficient social choice problem, the goal is to assign values, subject to side constraints, to a set of variables to maximize the total utility across a population of agent...
Private information about individuals that engage in e-commerce business transactions is of economic value to businesses for market analysis and for identifying possible future par...
Technological advances in the collection, storage and analysis of data have increased the ease with which businesses can make profitable use of information about individuals. Som...
Ram Gopal L., Robert S. Garfinkel, Manuel A. Nunez...
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
In this paper we study a large class of resource allocation problems with an important complication, the utilization cost of a given resource is private information of a profit ma...