Sciweavers

1779 search results - page 41 / 356
» A Formal Model of Data Privacy
Sort
View
CSFW
2007
IEEE
15 years 7 months ago
Collaborative Planning With Privacy
Collaboration among organizations or individuals is common. While these participants are often unwilling to share all their information with each other, some information sharing i...
Max I. Kanovich, Paul Rowe, Andre Scedrov
FDL
2005
IEEE
15 years 7 months ago
Formal Evaluation of Quality of Service for Data Acquisition
In the field of real-time control applications, validation relies on a precise knowledge of the temporal characteristics of the used data such as delays and loss rates. These data...
Hedia B. Ben, F. Jumel, Jean-Philippe Babau
JCP
2007
121views more  JCP 2007»
15 years 1 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
ASIACRYPT
2005
Springer
15 years 7 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
CORR
2010
Springer
134views Education» more  CORR 2010»
15 years 1 months ago
Large Margin Multiclass Gaussian Classification with Differential Privacy
As increasing amounts of sensitive personal information is aggregated into data repositories, it has become important to develop mechanisms for processing the data without revealin...
Manas A. Pathak, Bhiksha Raj