Sciweavers

1402 search results - page 131 / 281
» Personalized privacy preservation
Sort
View
122
Voted
CORR
2011
Springer
165views Education» more  CORR 2011»
14 years 7 months ago
On the Semantics of Purpose Requirements in Privacy Policies
Privacy policies often place requirements on the purposes for which a governed entity may use personal information. For example, regulations, such as HIPAA, require that hospital ...
Michael Carl Tschantz, Anupam Datta, Jeannette M. ...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
14 years 11 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik
133
Voted
WWW
2009
ACM
16 years 1 months ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor
CHI
2005
ACM
16 years 1 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
95
Voted
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
15 years 7 months ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung