Sciweavers

654 search results - page 60 / 131
» Privacy protection for RFID data
Sort
View
AINA
2010
IEEE
15 years 5 months ago
GEPETO: A GEoPrivacy-Enhancing TOolkit
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
Sébastien Gambs, Marc-Olivier Killijian, Mi...
79
Voted
VLDB
2004
ACM
106views Database» more  VLDB 2004»
15 years 6 months ago
Vision Paper: Enabling Privacy for the Paranoids
P3P [23, 24] is a set of standards that allow corporations to declare their privacy policies. Hippocratic Databases [6] have been proposed to implement such policies within a corp...
Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hec...
85
Voted
PVLDB
2010
95views more  PVLDB 2010»
14 years 11 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
123
Voted
SPW
2004
Springer
15 years 6 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 7 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...