Sciweavers

1906 search results - page 46 / 382
» Data Privacy
Sort
View
91
Voted
IFIPTM
2009
127views Management» more  IFIPTM 2009»
14 years 8 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
DMIN
2008
145views Data Mining» more  DMIN 2008»
15 years 17 days ago
Privacy-Preserving Classification of Horizontally Partitioned Data via Random Kernels
We propose a novel privacy-preserving nonlinear support vector machine (SVM) classifier for a data matrix A whose columns represent input space features and whose individual rows ...
Olvi L. Mangasarian, Edward W. Wild
IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
15 years 4 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
CCS
2008
ACM
15 years 1 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
JUCS
2010
162views more  JUCS 2010»
14 years 9 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...