Sciweavers

382 search results - page 23 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
68
Voted
PST
2004
14 years 11 months ago
Supporting Privacy in E-Learning with Semantic Streams
The goal of the semantic web is to facilitate the exchange of meaningful information in a form that is easy for machines to process. The goal of an e-learning system is to support ...
Lori Kettel, Christopher A. Brooks, Jim E. Greer
VLDB
2005
ACM
135views Database» more  VLDB 2005»
15 years 3 months ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao
SICHERHEIT
2010
14 years 7 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
PERCOM
2008
ACM
14 years 9 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
76
Voted
VLDB
2007
ACM
138views Database» more  VLDB 2007»
15 years 3 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...