Sciweavers

3272 search results - page 50 / 655
» Privacy in Data Publishing
Sort
View
ACSAC
2003
IEEE
15 years 7 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
14 years 11 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
ICDE
2005
IEEE
170views Database» more  ICDE 2005»
16 years 3 months ago
Data Privacy through Optimal k-Anonymization
Roberto J. Bayardo Jr., Rakesh Agrawal
IJMMS
2007
75views more  IJMMS 2007»
15 years 1 months ago
Internet users' perceptions of 'privacy concerns' and 'privacy actions'
A consistent finding reported in online privacy research is that an overwhelming majority of people are ‘concerned’ about their privacy when they use the Internet. Therefore,...
Carina Paine, Ulf-Dietrich Reips, Stefan Stieger, ...
SIGECOM
1999
ACM
125views ECommerce» more  SIGECOM 1999»
15 years 6 months ago
Privacy in e-commerce: examining user scenarios and privacy preferences
Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, b...
Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reag...