Sciweavers

3395 search results - page 112 / 679
» Computational Differential Privacy
Sort
View
PDCAT
2007
Springer
15 years 4 months ago
Monitoring Employees' Emails without Violating Their Privacy Right
The capability of an employee to violate the policy of an organization is a concern for an employer. Monitoring is a measure taken by an employer to discourage an employee from ac...
Giannakis Antoniou, Parampalli Udaya, Lynn Margare...
74
Voted
AINA
2005
IEEE
15 years 3 months ago
A Scheme for Testing Privacy State in Pervasive Sensor Networks
More and more sensor networks will be deployed in the place where people are living, studying, and working. These sensor networks bring us the convenience of accessing information...
Yingpeng Sang, Hong Shen
77
Voted
DEXAW
2003
IEEE
98views Database» more  DEXAW 2003»
15 years 3 months ago
Amending P3P for Clearer Privacy Promises
The Platform for Privacy Preferences (P3P) can be a viable tool for organizations to clarify their privacy promises. In this paper, we summarize our experiences and describe some ...
Günter Karjoth, Matthias Schunter, Els Van He...
ICCV
2009
IEEE
16 years 3 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
161
Voted
SIGMOD
2007
ACM
115views Database» more  SIGMOD 2007»
15 years 10 months ago
Privacy preserving schema and data matching
In many business scenarios, record matching is performed across different data sources with the aim of identifying common information shared among these sources. However such need...
Monica Scannapieco, Ilya Figotin, Elisa Bertino, A...