Sciweavers

654 search results - page 71 / 131
» Privacy protection for RFID data
Sort
View
TIS
2002
74views more  TIS 2002»
15 years 6 days ago
Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness
: Modern information systems not only capture a seemingly endless amount of transactional data, but also tend to retain it for indefinite periods of time. We argue that privacy pol...
Jean-François Blanchette, Deborah G. Johnso...
100
Voted
PODS
2005
ACM
96views Database» more  PODS 2005»
16 years 21 days ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
VLDB
2007
ACM
137views Database» more  VLDB 2007»
16 years 24 days ago
Fast Data Anonymization with Low Information Loss
Recent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy preserving paradigms of k-anonymity and -diversity. k-a...
Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, ...
101
Voted
ACSAC
2010
IEEE
14 years 10 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
16 years 1 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...