Sciweavers

1790 search results - page 83 / 358
» On Privacy Models for RFID
Sort
View
CCS
2010
ACM
15 years 4 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CORR
2011
Springer
165views Education» more  CORR 2011»
14 years 12 months ago
On the Semantics of Purpose Requirements in Privacy Policies
Privacy policies often place requirements on the purposes for which a governed entity may use personal information. For example, regulations, such as HIPAA, require that hospital ...
Michael Carl Tschantz, Anupam Datta, Jeannette M. ...
HASE
2008
IEEE
15 years 11 months ago
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management
Privacy, preservation and performance (“3 P’s”) are central design objectives for distributed data management systems. However, these objectives tend to compete with one ano...
Bobji Mungamuru, Hector Garcia-Molina
CORR
2010
Springer
134views Education» more  CORR 2010»
15 years 5 months ago
Large Margin Multiclass Gaussian Classification with Differential Privacy
As increasing amounts of sensitive personal information is aggregated into data repositories, it has become important to develop mechanisms for processing the data without revealin...
Manas A. Pathak, Bhiksha Raj
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
16 years 5 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor