Sciweavers

97 search results - page 3 / 20
» Markets and Privacy
Sort
View
ETRICS
2006
13 years 9 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
EDBTW
2010
Springer
14 years 18 days ago
A method for evaluating marketer re-identification risk
Disclosures of health databases for secondary purposes is increasing rapidly. In this paper, we develop and evaluate a reidentification risk metric for the case where an intruder ...
Fida Kamal Dankar, Khaled El Emam
AGENTS
1998
Springer
13 years 10 months ago
Competitive Scenarios for Heterogeneous Trading Agents
We present a framework for de ning trading scenarios based on sh market auctions. In these scenarios, agents of arbitrary complexity can participate in electronic auctions under ...
Juan A. Rodríguez-Aguilar, Francisco J. Mar...
WEBI
2005
Springer
13 years 11 months ago
Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data
Collaborative filtering techniques are widely used by many E-commerce sites for recommendation purposes. Such techniques help customers by suggesting products to purchase using o...
Huseyin Polat, Wenliang Du
CCS
2008
ACM
13 years 7 months ago
Spamalytics: an empirical analysis of spam marketing conversion
The "conversion rate" of spam -- the probability that an unsolicited e-mail will ultimately elicit a "sale" -- underlies the entire spam value proposition. How...
Chris Kanich, Christian Kreibich, Kirill Levchenko...