Sciweavers

201 search results - page 5 / 41
» A Utility-Theoretic Approach to Privacy and Personalization
Sort
View
AGENTLINK
2003
Springer
246views ECommerce» more  AGENTLINK 2003»
15 years 2 months ago
User Profiling with Privacy: A Framework for Adaptive Information Agents
This paper presents a framework for personal agents that respect the privacy of the individual. We present some motivations and outline a framework for the use of personal agents a...
Ian Dickinson, Dave Reynolds, Dave Banks, Steve Ca...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
EDBT
2004
ACM
234views Database» more  EDBT 2004»
15 years 9 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
VLDB
2007
ACM
96views Database» more  VLDB 2007»
15 years 3 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...
67
Voted
SOUPS
2009
ACM
15 years 4 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris