Sciweavers

2355 search results - page 219 / 471
» Anonymizing Temporal Data
Sort
View
ESORICS
2004
Springer
15 years 9 months ago
Portable and Flexible Document Access Control Mechanisms
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). ...
Mikhail J. Atallah, Marina Bykova
SAC
2010
ACM
15 years 9 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
DIM
2007
ACM
15 years 8 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
USENIX
1993
15 years 5 months ago
Essence: A Resource Discovery System Based on Semantic File Indexing
Discovering different types of file resources (such as documentation, programs, and images) in the vast amount of data contained within network file systems is useful for both u...
Darren R. Hardy, Michael F. Schwartz
DATAMINE
2002
135views more  DATAMINE 2002»
15 years 4 months ago
Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization
: Web usage mining, possibly used in conjunction with standard approaches to personalization such as collaborative filtering, can help address some of the shortcomings of these tec...
Bamshad Mobasher, Honghua Dai, Tao Luo, Miki Nakag...