Sciweavers

654 search results - page 49 / 131
» Privacy protection for RFID data
Sort
View
90
Voted
PODS
2012
ACM
244views Database» more  PODS 2012»
13 years 19 days ago
A rigorous and customizable framework for privacy
In this paper we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized t...
Daniel Kifer, Ashwin Machanavajjhala
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
14 years 8 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs
IEEEARES
2010
IEEE
15 years 3 months ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
ICDE
2009
IEEE
154views Database» more  ICDE 2009»
15 years 12 months ago
A General Proximity Privacy Principle
Recent years have witnessed ever-increasing concerns about individual privacy in numerous data dissemination applications that involve private personal information, e.g., medical...
Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, C...
244
Voted
VLDB
2006
ACM
122views Database» more  VLDB 2006»
15 years 10 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton