Sciweavers

13 search results - page 2 / 3
» Privacy-enhanced personalization
Sort
View
CIKM
2006
Springer
13 years 9 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
IADIS
2004
13 years 7 months ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl
WWW
2008
ACM
14 years 6 months ago
Privacy-enhanced sharing of personal content on the web
Publishing personal content on the web is gaining increased popularity with dramatic growth in social networking websites, and availability of cheap personal domain names and host...
Mohammad Mannan, Paul C. van Oorschot
DIM
2005
ACM
13 years 7 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
JCP
2007
121views more  JCP 2007»
13 years 5 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray