Sciweavers

2272 search results - page 257 / 455
» Provable Data Privacy
Sort
View
STORAGESS
2005
ACM
15 years 9 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
CSCW
2008
ACM
15 years 5 months ago
Imprint, a community visualization of printer data: designing for open-ended engagement on sustainability
We introduce Imprint, a casual information visualization kiosk that displays data extracted from a printer queue. We designed the system to be open-ended, and to support a workgro...
Zachary Pousman, Hafez Rouzati, John T. Stasko
TRUST
2009
Springer
15 years 10 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 10 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...