Sciweavers

1779 search results - page 31 / 356
» A Formal Model of Data Privacy
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 1 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
UM
2005
Springer
15 years 7 months ago
Temporal Blurring: A Privacy Model for OMS Users
Stereotypes and clustering are some techniques for creating user models from user behavior. Yet, they possess important risks as users actions could be misinterpreted or users coul...
Rosa Alarcón, Luis A. Guerrero, José...
TSMC
2011
228views more  TSMC 2011»
14 years 8 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
ASM
2010
ASM
15 years 1 months ago
Matelas: A Predicate Calculus Common Formal Definition for Social Networking
This paper presents Matelas, a B predicate calculus definition for social networking, modelling social-network content, privacy policies, social-networks friendship relations, and ...
Néstor Cataño, Camilo Rueda
ACSAC
1998
IEEE
15 years 5 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer