Sciweavers

1402 search results - page 169 / 281
» Personalized privacy preservation
Sort
View
PERCOM
2010
ACM
14 years 11 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
CORR
2011
Springer
142views Education» more  CORR 2011»
14 years 7 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
102
Voted
CORR
2010
Springer
244views Education» more  CORR 2010»
15 years 23 days ago
Fingerprint Recognition Using Minutia Score Matching
: The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprin...
J. Ravi, K. B. Raja, K. R. Venugopal
130
Voted
CODASPY
2011
14 years 4 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 12 days ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li