Sciweavers

1906 search results - page 142 / 382
» Data Privacy
Sort
View
ACSC
2009
IEEE
15 years 10 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
ICASSP
2011
IEEE
14 years 7 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...
101
Voted
CCS
2008
ACM
15 years 5 months ago
Rootkit-resistant disks
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Such malware becomes even more dangerou...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
124
Voted
IPAW
2010
15 years 1 months ago
Social Web-Scale Provenance in the Cloud
One of the biggest effects of Web 2.0 and the evolution of the social Web is the commoditization of data. The emergence of applications such as Facebook and Twitter, have lowered t...
Yogesh Simmhan, Karthik Gomadam
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
15 years 1 months ago
A Practical Differentially Private Random Decision Tree Classifier
In this paper, we study the problem of constructing private classifiers using decision trees, within the framework of differential privacy. We first construct privacy-preserving ID...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...