Sciweavers

5255 search results - page 158 / 1051
» Formal Methods for Privacy
Sort
View
138
Voted
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
16 years 4 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
15 years 8 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
101
Voted
CORR
2010
Springer
61views Education» more  CORR 2010»
15 years 3 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
ESORICS
2009
Springer
16 years 4 months ago
Secure Ownership and Ownership Transfer in RFID Systems
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitio...
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pi...
IEEEARES
2009
IEEE
15 years 10 months ago
Algebraic Properties in Alice and Bob Notation
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...
Sebastian Mödersheim