Sciweavers

210 search results - page 15 / 42
» Personalized Privacy Protection in Social Networks
Sort
View
CHI
2010
ACM
15 years 6 months ago
Moving beyond untagging: photo privacy in a tagged world
Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each pers...
Andrew Besmer, Heather Richter Lipford
INFOCOM
2011
IEEE
14 years 4 months ago
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin S...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 5 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
ICDE
2009
IEEE
154views Database» more  ICDE 2009»
16 years 3 months ago
A General Proximity Privacy Principle
Recent years have witnessed ever-increasing concerns about individual privacy in numerous data dissemination applications that involve private personal information, e.g., medical...
Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, C...
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
14 years 11 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...