Sciweavers

1779 search results - page 68 / 356
» A Formal Model of Data Privacy
Sort
View
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
16 years 1 months ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
POPL
2012
ACM
13 years 9 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
PDSE
1998
131views more  PDSE 1998»
15 years 2 months ago
A Formally Founded Description Technique for Business Processes
As a means of modeling typical system behavior, we present a description technique for business processes derived from data flow nets and provide it with a formal semantics based ...
Veronika Thurner
TMC
2008
159views more  TMC 2008»
14 years 12 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
167
Voted
CONEXT
2009
ACM
15 years 2 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...