Sciweavers

239 search results - page 11 / 48
» Accountable Privacy
Sort
View
WPES
2006
ACM
15 years 7 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle
IPMU
2010
Springer
15 years 8 days ago
Addressing Complexity in a Privacy Expert System
:  Simple Mode: Addressing Knowledge Engineering Complexity in a Privacy Expert System Siani Pearson HP Laboratories HPL-2010-75 privacy, decision support, usability, knowledge ...
Siani Pearson
134
Voted
CSFW
2006
IEEE
15 years 8 months ago
Games for Controls
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
Krishnendu Chatterjee, Radha Jagadeesan, Corin Pit...
114
Voted
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 7 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
114
Voted
IJCAI
2003
15 years 3 months ago
A Semantic-Based User Privacy Protection Framework for Web Services
Abstract. Web service technology is an Internet-based distributed computing paradigm to address interoperability in heterogeneous distributed systems. In this paper, we present a p...
Arif Tumer, Asuman Dogac, Ismail Hakki Toroslu