Sciweavers

1906 search results - page 136 / 382
» Data Privacy
Sort
View
142
Voted
PVLDB
2008
146views more  PVLDB 2008»
15 years 2 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
98
Voted
ISI
2007
Springer
15 years 9 months ago
Making Sense of VAST Data
: We view the task of sensemaking in intelligence as that of abducing a story whose plot explains the current data and makes verifiable predictions about the future and the past. W...
Summer Adams, Ashok K. Goel
121
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
122
Voted
CASCON
2004
129views Education» more  CASCON 2004»
15 years 4 months ago
Building predictors from vertically distributed data
Due in part to the large volume of data available today, but more importantly to privacy concerns, data are often distributed across institutional, geographical and organizational...
Sabine M. McConnell, David B. Skillicorn
WPES
2004
ACM
15 years 8 months ago
Will your digital butlers betray you?
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion—digital systems that remember forever and can b...
Frank Stajano