Sciweavers

2001 search results - page 35 / 401
» A security architecture for data privacy and security
Sort
View
GIS
2008
ACM
15 years 26 days ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
16 years 5 days ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 5 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
OOPSLA
2009
Springer
15 years 4 months ago
Architecture in an agile world
Steven Fraser, Ethan Hadar, Irit Hadar, Dennis Man...
SIGKDD
2008
138views more  SIGKDD 2008»
14 years 11 months ago
PinKDD'08: privacy, security, and trust in KDD post workshop report
This report summarizes the events of the 2nd International Workshop on Privacy, Security, and Trust in KDD, at the 14th ACM SIGKDD International Conference on Knowledge Discovery ...
Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradle...