Sciweavers

239 search results - page 11 / 48
» Accountable Privacy
Sort
View
WPES
2006
ACM
15 years 5 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle
69
Voted
IPMU
2010
Springer
14 years 10 months ago
Addressing Complexity in a Privacy Expert System
:  Simple Mode: Addressing Knowledge Engineering Complexity in a Privacy Expert System Siani Pearson HP Laboratories HPL-2010-75 privacy, decision support, usability, knowledge ...
Siani Pearson
CSFW
2006
IEEE
15 years 5 months ago
Games for Controls
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
Krishnendu Chatterjee, Radha Jagadeesan, Corin Pit...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
IJCAI
2003
15 years 1 months ago
A Semantic-Based User Privacy Protection Framework for Web Services
Abstract. Web service technology is an Internet-based distributed computing paradigm to address interoperability in heterogeneous distributed systems. In this paper, we present a p...
Arif Tumer, Asuman Dogac, Ismail Hakki Toroslu