Sciweavers

834 search results - page 37 / 167
» Quantifying and Measuring Anonymity
Sort
View
66
Voted
ICCS
2003
Springer
15 years 5 months ago
Measurement Models for Survivability and Competitiveness of Very Large E-marketplace
E-Marketplace is a man-made profit center with emergent customer requirements. This emergence nature poses many difficulties for e-marketplace to satisfy its customers and thus aff...
Jingzhi Guo, Chengzheng Sun
100
Voted
IPPS
2007
IEEE
15 years 7 months ago
A Probabilistic Approach to Measuring Robustness in Computing Systems
System builders are becoming increasingly interested in robust design. We believe that a methodology for generating robustness metrics will help the robust design research efforts...
Behdis Eslamnour, Shoukat Ali
110
Voted
IEEEARES
2008
IEEE
15 years 7 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
161
Voted
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 4 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
119
Voted
CCS
2009
ACM
16 years 1 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao