Sciweavers

1906 search results - page 104 / 382
» Data Privacy
Sort
View
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
15 years 2 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
INFOCOM
2011
IEEE
14 years 2 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
VLDB
2006
ACM
490views Database» more  VLDB 2006»
16 years 11 months ago
The New Casper: Query Processing for Location Services without Compromising Privacy
This paper tackles a major privacy concern in current location-based services where users have to continuously report their locations to the database server in order to obtain the ...
Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref
EUC
2008
Springer
15 years 1 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 1 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang