Sciweavers

CIKM
2006
Springer
13 years 8 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
APWEB
2006
Springer
13 years 8 months ago
Implementing Privacy Negotiations in E-Commerce
This paper examines how service providers may resolve the trade-off between their personalization efforts and users' individual privacy concerns. We analyze how negotiation te...
Sören Preibusch
ICAIL
2007
ACM
13 years 8 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
GROUP
2007
ACM
13 years 8 months ago
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
The tension between privacy and awareness has been a persistent difficulty in distributed environments that support opportunistic and informal interaction. For example, many aware...
Jeremy P. Birnholtz, Carl Gutwin, Kirstie Hawkey
ESAS
2007
Springer
13 years 8 months ago
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs
The promise of vehicular communications is to make road traffic safer and more efficient. However, besides the expected benefits, vehicular communications also introduce some priva...
Levente Buttyán, Tamás Holczer, Istv...
PET
2010
Springer
13 years 8 months ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol
SIGECOM
1999
ACM
125views ECommerce» more  SIGECOM 1999»
13 years 8 months ago
Privacy in e-commerce: examining user scenarios and privacy preferences
Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, b...
Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reag...
UM
2001
Springer
13 years 9 months ago
Tailoring Privacy to Users' Needs
This article discusses how the deployment of personalized systems is affected by users’ privacy concerns and by privacy legislation. It shows that these impacts are substantial a...
Alfred Kobsa
COMPSAC
2009
IEEE
13 years 9 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
CHI
2010
ACM
13 years 9 months ago
Moving beyond untagging: photo privacy in a tagged world
Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each pers...
Andrew Besmer, Heather Richter Lipford