Sciweavers

1790 search results - page 88 / 358
» On Privacy Models for RFID
Sort
View
KDD
2007
ACM
121views Data Mining» more  KDD 2007»
16 years 5 months ago
Preserving the Privacy of Sensitive Relationships in Graph Data
Abstract. In this paper, we focus on the problem of preserving the privacy of sensitive relationships in graph data. We refer to the problem of inferring sensitive relationships fr...
Elena Zheleva, Lise Getoor
PERCOM
2009
ACM
16 years 6 days ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
SACMAT
2006
ACM
15 years 11 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
SNPD
2007
15 years 6 months ago
Localized Flooding Backbone Construction for Location Privacy in Sensor Networks
Source and destination location privacy is a challenging and important problem in sensor networks. Nevertheless, privacy preserving communication in sensor networks is still a vir...
Yingchang Xiang, Dechang Chen, Xiuzhen Cheng, Kai ...
CSE
2009
IEEE
16 years 4 days ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han