Sciweavers

653 search results - page 22 / 131
» Database Privacy
Sort
View
GIS
2009
ACM
16 years 25 days ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
13 years 2 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
120
Voted
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 6 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
EUROCRYPT
2006
Springer
15 years 3 months ago
Our Data, Ourselves: Privacy Via Distributed Noise Generation
In this work we provide efficient distributed protocols for generating shares of random noise, secure against malicious participants. The purpose of the noise generation is to crea...
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSher...
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
14 years 12 months ago
Ranking Privacy Policy
Almost all company websites collect some information about the user in some form. The information may be a simple IP address of the host to extensive personal information about th...
Rajeev Agrawal, William I. Grosky, Farshad Fotouhi