Sciweavers

654 search results - page 64 / 131
» Privacy protection for RFID data
Sort
View
SIGMOD
2011
ACM
283views Database» more  SIGMOD 2011»
14 years 3 months ago
iReduct: differential privacy with reduced relative errors
Prior work in differential privacy has produced techniques for answering aggregate queries over sensitive data in a privacypreserving way. These techniques achieve privacy by addi...
Xiaokui Xiao, Gabriel Bender, Michael Hay, Johanne...
87
Voted
JLBS
2007
75views more  JLBS 2007»
15 years 14 days ago
Designing privacy-aware mobility pricing systems based on user perspective
Mobility-pricing is one of the avenues leading to the information highway. Using a combination of positioning, communication and information processing, automobile insurance can b...
Muhammad Usman Iqbal, Samsung Lim
83
Voted
IEEEARES
2009
IEEE
15 years 7 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul
ACSAC
1999
IEEE
15 years 4 months ago
Application-Level Isolation Using Data Inconsistency Detection
Recently, application-level isolation was introduced as an effective means of containing the damage that a suspicious user could inflict on data. In most cases, only a subset of t...
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
117
Voted
AUSDM
2006
Springer
157views Data Mining» more  AUSDM 2006»
15 years 4 months ago
Safely Delegating Data Mining Tasks
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Ling Qiu, Kok-Leong Ong, Siu Man Lui