Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Laurence Bull, David McG. Squire, Yuliang Zheng 0001 |
A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content. |
Int. J. Digit. Libr. |
2004 |
DBLP DOI BibTeX RDF |
Content extraction signatures, XML Signature custom transforms, Selective content disclosure, Hierarchical Extraction Policy, Privacy-enhancing signatures |
23 | Vicenç Torra, Sadaaki Miyamoto |
Evaluating Fuzzy Clustering Algorithms for Microdata Protection. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
Fuzzy clustering, Privacy preserving data mining, Statistical Disclosure Control, Inference Control, Microaggregation, Microdata Protection |
23 | Jordi Castro 0001 |
A Fast Network Flows Heuristic for Cell Suppression in Positive Tables. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
cell suppression problem, linear programming, shortest-paths, statistical disclosure control, network optimization |
23 | Jim Burridge |
Information preserving statistical obfuscation. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
multivariate multiple regression model, decomposable graphical models, confidentiality, contingency tables, disclosure, data perturbation, sufficient statistics |
23 | Luisa Franconi, Julian Stander |
Spatial and non-spatial model-based protection procedures for the release of business microdata. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
Community Innovation Survey, conditional autoregressive scheme, performance assessment for disclosure limitation methods, confidentiality, Gibbs sampler |
23 | Marco Casassa Mont, Keith Harrison, Martin Sadler |
The HP time vault service: exploiting IBE for timed release of confidential information. |
WWW |
2003 |
DBLP DOI BibTeX RDF |
disclosure policies, identifier-based encryption, timed-release, security, web service, privacy |
23 | Hristo Koshutanski, Fabio Massacci |
An access control framework for business processes for web services. |
XML Security |
2003 |
DBLP DOI BibTeX RDF |
controlled disclosure, interactive access control, web services, e-business, security management, distributed systems security |
23 | Ruth Brand |
Microdata Protection through Noise Addition. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
Statistical disclosure control, microdata protection, noise addition |
23 | Peter-Paul de Wolf |
HiTaS: A Heuristic Approach to Cell Suppression in Hierarchical Tables. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
table suppression, hierarchical structure, Statistical Disclosure Control, top-down method |
21 | Wen Ming Liu, Lingyu Wang 0001, Lei Zhang 0004 |
k-jump strategy for preserving privacy in micro-data disclosure. |
ICDT |
2010 |
DBLP DOI BibTeX RDF |
|
21 | |
Statistical Disclosure Limitation (SDL). |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
21 | |
Statistical Disclosure Control (SDC). |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
21 | |
Identity Disclosure. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Gautam Das 0001, Nan Zhang 0004 |
Privacy risks in health databases from aggregate disclosure. |
PETRA |
2009 |
DBLP DOI BibTeX RDF |
privacy preservation, hidden databases |
21 | David McKinney |
New Hurdles for Vulnerability Disclosure. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Kulsoom Abdullah, Gregory J. Conti, Raheem A. Beyah |
A Visualization Framework for Self-Monitoring of Web-Based Information Disclosure. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke |
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede |
Perfect Matching Disclosure Attacks. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Chris Skinner |
Assessing Disclosure Risk for Record Linkage. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
misclassification, match, identification, uniqueness, log-linear model |
21 | Vipin Singh Mewar, Subhendu Aich, Shamik Sural |
Access Control Model for Web Services with Attribute Disclosure Restriction. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis, Claudia Díaz, Carmela Troncoso |
Two-Sided Statistical Disclosure Attack. |
Privacy Enhancing Technologies |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Vikram Goyal, Shyam K. Gupta 0001, Indira Meshram, Anand Gupta |
PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Rainer Böhme |
A Comparison of Market Approaches to Software Vulnerability Disclosure. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Stefan Böttcher, Rita Steinmetz |
Information Disclosure by XPath Queries. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Tom Gross, Christoph Oemig |
From PRIMI to PRIMIFaces: Technical Concepts for Selective Information Disclosure. |
EUROMICRO-SEAA |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Vicenç Torra, John M. Abowd, Josep Domingo-Ferrer |
Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
Distance-based record linkage, Mahalanobis distance, Microdata protection |
21 | Ana Almeida Matos, Gérard Boudol |
On Declassification and the Non-Disclosure Policy. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, Pauline S. Powledge |
Location disclosure to social relations: why, when, & what people want to share. |
CHI |
2005 |
DBLP DOI BibTeX RDF |
location-enhanced computing, privacy classification, social relations, privacy, ubiquitous computing, experience sampling |
21 | Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman |
Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution. |
Secure Data Management |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli |
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Fabio Massacci, John Mylopoulos, Nicola Zannone |
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ana Almeida Matos |
Non-disclosure for Distributed Mobile Code. |
FSTTCS |
2005 |
DBLP DOI BibTeX RDF |
|
21 | David Megías 0001, Jordi Herrera-Joancomartí, Julià Minguillón |
Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Information Hiding, Audio Watermarking, Intellectual Property Protection |
21 | Franciska de Jong |
Disclosure of Non-scripted Video Content: InDiCo and M4/AMI. |
CIVR |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Karthik N. Kannan, Rahul Telang, Hao Xu |
Economic Analysis of the Market for Software Vulnerability Disclosure. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Josep A. Sànchez, Julià Urrutia, Enric Ripoll |
Trade-Off between Disclosure Risk and Information Loss Using Multivariate Microaggregation: A Case Study on Business Data. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Satish K. Sehgal, Asim K. Pal |
Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure. |
IWDC |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Schneier |
Locks and Full Disclosure. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Chun-Shien Lu, Chao-Yong Hsu |
Content-Dependent Anti-disclosure Image Watermark. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Pieter W. Adriaans |
Grammar Induction and Adaptive Information Disclosure. |
EPIA |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Michael G. Wahl, Sudipta Bhawmik, Kamran Zarrineh, Pradipta Ghosh, Scott Davidson 0001, Peter Harrod |
The P1500 DFT Disclosure Document: A Standard to Communicate Mergeable Core DFT Data. |
ITC |
2003 |
DBLP DOI BibTeX RDF |
|
21 | David Rosenthal, Francis Fung |
A Test for Non-Disclosure in Security Level Translations. |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Julien P. Stern |
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Gilles Brassard, Claude Crépeau, Jean-Marc Robert 0001 |
All-or-Nothing Disclosure of Secrets. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
21 | Jan Schlörer |
Disclosure from Statistical Databases: Quantitative Aspects of Trackers. |
ACM Trans. Database Syst. |
1980 |
DBLP DOI BibTeX RDF |
security, confidentiality, database security, statistical database, tracker |
17 | Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker |
Beyond heuristics: learning to classify vulnerabilities and predict exploits. |
KDD |
2010 |
DBLP DOI BibTeX RDF |
SVM, supervised learning, vulnerabilities, exploits |
17 | Jun Ki Lee, Cynthia Breazeal |
Human social response toward humanoid robot's head and facial features. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
robots, user studies, elderly, agents and intelligent systems |
17 | Jianxin Li 0002, Dacheng Zhang, Jinpeng Huai, Jie Xu 0007 |
Context-aware trust negotiation in peer-to-peer service collaborations. |
Peer-to-Peer Netw. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Peer-to-peer access control, Security policy, Privacy preservation, Credential, Trust establishment |
17 | Aïda Valls, Cristina Gómez-Alonso, Vicenç Torra |
Generation of Prototypes for Masking Sequences of Events. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Javier Jiménez, Vicenç Torra |
Utility and Risk of JPEG-Based Continuous Microdata Protection Methods. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Xiaokui Xiao, Guozhang Wang, Johannes Gehrke |
Interactive anonymization of sensitive data. |
SIGMOD Conference |
2009 |
DBLP DOI BibTeX RDF |
l-diversity, data anonymization |
17 | Mary-Anne Williams |
Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
Relationship Based Privacy Management for Ubiquitous Society. |
ICCSA (1) |
2009 |
DBLP DOI BibTeX RDF |
Privacy Data Graph, Privacy, Role Based Access Control, Privacy Preference |
17 | Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino |
A Hybrid Technique for Private Location-Based Queries with Database Protection. |
SSTD |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi |
Anonymity preserving pattern discovery. |
VLDB J. |
2008 |
DBLP DOI BibTeX RDF |
Individual privacy, anonymity, Knowledge discovery, Privacy preserving data mining, Frequent pattern mining |
17 | Nicolas Anciaux, Luc Bouganim, Harold van Heerde, Philippe Pucheral, Peter M. G. Apers |
Data degradation: making private data less sensitive over time. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
data degradation, limited retention, privacy |
17 | Christopher W. Clifton |
Opportunities for private and secure machine learning. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, artificial intelligence |
17 | Vicenç Torra, Susana Ladra |
Cluster-Specific Information Loss Measures in Data Privacy: A Review. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
data mining, clustering, Privacy |
17 | Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo |
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
RFID security and privacy |
17 | Joshua Carroll, Thomas Y. Lee |
A genetic algorithm for segmentation and information retrieval of SEC regulatory filings. |
DG.O |
2008 |
DBLP BibTeX RDF |
SEC, structured information retrieval, genetic algorithms, document segmentation |
17 | Xavier Boyen, Cécile Delerablée |
Expressive Subgroup Signatures. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Lawrence H. Cox |
A Data Quality and Data Confidentiality Assessment of Complementary Cell Suppression. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
alternating cycle, releasing exact intervals, p/q-ambiguity rule |
17 | Paolo D'Arco, Alfredo De Santis |
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Mohamed Jawad, Patricia Serrano-Alvarado, Patrick Valduriez |
Design of PriServ, a privacy service for DHTs. |
PAIS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Rahul Telang, Sunil Wattal |
An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
software vendors, quality, Information security, patching, software vulnerability, event-study |
17 | David J. Martin 0001, Daniel Kifer, Ashwin Machanavajjhala, Johannes Gehrke, Joseph Y. Halpern |
Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian |
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino |
Privacy Requirements in Identity Management Solutions. |
HCI (9) |
2007 |
DBLP DOI BibTeX RDF |
Social and Legal Concerns, Security, Privacy, Identity Management |
17 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Patrick Schaller, Srdjan Capkun, David A. Basin |
BAP: Broadcast Authentication Using Cryptographic Puzzles. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ryan Wishart, Karen Henricksen, Jadwiga Indulska |
Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino |
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. |
ICDCS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan |
Exploring Symmetric Cryptography for Secure Network Reprogramming. |
ICDCS Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yan He 0001, Miaoliang Zhu |
A complete and efficient strategy based on petri net in automated trust negotiation. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
negotiation petri net, automated trust negotiation, negotiation strategy |
17 | Zhen Li, Xiaojun Ye |
Privacy Protection on Multiple Sensitive Attributes. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Attribute-Based Access Control with Hidden Policies and Hidden Credentials. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Electronic commerce-security, hidden credentials, privacy, authentication, access control, trust negotiation, security and protection, management of computing and information systems |
17 | Qing Li 0034, Wade Trappe |
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Traian Marius Truta, Bindu Vinay |
Privacy Protection: p-Sensitive k-Anonymity Property. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules. |
DEXA |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai |
Reliable Broadcast Message Authentication in Wireless Sensor Networks. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
One-way Key Chain, Secure Acknowledgment, Sensor Networks, Message Authentication, Software Update, Symmetric-key |
17 | Loredana Di Consiglio, Silvia Polettini |
Improving Individual Risk Estimators. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Arthur Kennickell, Julia Lane |
Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Mikhail J. Atallah |
Security Issues in Collaborative Computing. |
COCOON |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Xintao Wu, Yongge Wang, Yuliang Zheng 0001 |
Statistical Database Modeling for Privacy Preserving Database Generation. |
ISMIS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Mikhail J. Atallah |
Data Confidentiality in Collaborative Computing. |
HiPC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jingsha He, Ran Zhang |
Towards a Formal Framework for Distributed Identity Management. |
APWeb |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jesús A. De Loera, Shmuel Onn |
All Rational Polytopes Are Transportation Polytopes and All Polytopal Integer Sets Are Contingency Tables. |
IPCO |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Hidden access control policies with hidden credentials. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
hidden credentials, privacy, access control, secure multi-party computation, trust negotiation |
17 | Alfred Kobsa, Maximilian Teltzrow |
Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Sarah Giessing |
Survey on Methods for Tabular Data Protection in ARGUS. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Claus Boyens, Oliver Günther 0001 |
Detection and Limitation of Interval Inference in Statistical Databases. |
SSDBM |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Hristo Koshutanski, Fabio Massacci |
An Interactive Trust Management and Negotiation Scheme. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
Interactive Trust Management, Interactive Access Control, Credential-Based Systems, Logics for Access Control, Trust Management, Internet Computing, Trust Negotiation |
17 | Csilla Farkas, Sushil Jajodia |
The Inference Problem: A Survey. |
SIGKDD Explor. |
2002 |
DBLP DOI BibTeX RDF |
external knowledge, access control, data security, semantic modeling, inference control |
17 | Kent E. Seamons, Marianne Winslett, Ting Yu 0001, Lina Yu, Ryan Jarvis |
Protecting Privacy during On-Line Trust Negotiation. |
Privacy Enhancing Technologies |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Krishnamurty Muralidhar, Rathindra Sarathy |
Security of Random Data Perturbation Methods. |
ACM Trans. Database Syst. |
1999 |
DBLP DOI BibTeX RDF |
random data perturbation, bias, covariance, noise addition |
17 | Heinrich Krebs, Swapan Mitra |
Hardware Redundant Vital Computers - Demonstration of Safety on the Basis of Current Standards. |
SAFECOMP |
1999 |
DBLP DOI BibTeX RDF |
|
17 | F. J. M. Bosman, Peter Bruza, Theo P. van der Weide, L. V. M. Weusten |
Documentation, Cataloging and Query by Navigation: A Practical and Sound Approach. |
ECDL |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Akira Ito |
How do Autonomous Agents Solve Social Dilemmas? |
PRICAI Workshop on Intelligent Agent Systems |
1996 |
DBLP DOI BibTeX RDF |
|
17 | Sumit Dutta Chowdhury, George T. Duncan, Ramayya Krishnan, Stephen F. Roehrig, Sumitra Mukherjee |
Logical vs. Numerical Inference on Statistical Databases. |
HICSS (2) |
1996 |
DBLP DOI BibTeX RDF |
|
17 | Mohammed Inam Ul Haq |
Insuring individual's privacy from statistical data base users. |
AFIPS National Computer Conference |
1975 |
DBLP DOI BibTeX RDF |
|