Sciweavers

1402 search results - page 197 / 281
» Personalized privacy preservation
Sort
View
VLDB
2002
ACM
165views Database» more  VLDB 2002»
15 years 6 days ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
89
Voted
CVPR
2010
IEEE
14 years 11 months ago
Cost-Sensitive Subspace Learning for Face Recognition
Conventional subspace learning-based face recognition aims to attain low recognition errors and assumes same loss from all misclassifications. In many real-world face recognition...
Jiwen Lu, Tan Yap-Peng
100
Voted
CCS
2001
ACM
15 years 4 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
119
Voted
WWW
2008
ACM
16 years 1 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
16 years 1 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright