Sciweavers

515 search results - page 18 / 103
» Measuring Voter-Controlled Privacy
Sort
View
TRUST
2010
Springer
15 years 7 days ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte
IVS
2006
127views more  IVS 2006»
15 years 1 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
PODS
2003
ACM
156views Database» more  PODS 2003»
16 years 2 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
ICIS
2004
15 years 3 months ago
Opting-in or Opting-out on the Internet: Does it Really Matter?
Personal privacy has become one of the pressure points that comprises utmost primacy in the scientific community. An often debated privacy issue concerns the means of soliciting c...
Yee-Lin Lai, Kai Lung Hui
112
Voted
CCR
2006
76views more  CCR 2006»
15 years 1 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang