Sciweavers

1402 search results - page 124 / 281
» Personalized privacy preservation
Sort
View
142
Voted
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
14 years 10 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
127
Voted
IIWAS
2007
15 years 2 months ago
User Data Privacy in Web Services Context Using Semantic Desktop - SemanticLIFE Case Study
The growing number of Web Services technologies and their use have revolutionized the web. Web Services will play an important role in the next web generation (i.e. Semantic Web) ...
Mansoor Ahmed, Amin Andjomshoaa, A. Min Tjoa
CADE
2005
Springer
16 years 1 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
80
Voted
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
An economic model of portal competition under privacy concerns
Due to inherent privacy concerns, online personalization services such as those offered through toolbars and desktop widgets are characterized by "no-free-disposal" (NFD...
Ramnath K. Chellappa, Raymond G. Sin
91
Voted
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
15 years 10 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu