Sciweavers

234 search results - page 33 / 47
» Data collection with self-enforcing privacy
Sort
View
ICS
2010
Tsinghua U.
15 years 7 months ago
Pan-Private Streaming Algorithms
Collectors of confidential data, such as governmental agencies, hospitals, or search engine providers, can be pressured to permit data to be used for purposes other than that for ...
Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. ...
PET
2004
Springer
15 years 3 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
TCC
2010
Springer
173views Cryptology» more  TCC 2010»
15 years 6 months ago
Bounds on the Sample Complexity for Private Learning and Private Data Release
Learning is a task that generalizes many of the analyses that are applied to collections of data, and in particular, collections of sensitive individual information. Hence, it is n...
Amos Beimel, Shiva Prasad Kasiviswanathan, Kobbi N...
ACSAC
2010
IEEE
14 years 7 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
15 years 11 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa