|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11410 occurrences of 3224 keywords
|
|
|
Results
Found 63337 publication records. Showing 63336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 107-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
34 | Esma Aïmeur, Sébastien Gambs, Ai Ho |
Towards a Privacy-Enhanced Social Networking Site. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 172-179, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Privacy Risks, Privacy Incidents, Privacy-enhanced Social Networking Site, Privacy, Social Networking Sites |
34 | Mary-Anne Williams |
Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 60-67, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Ciaran O'Driscoll |
Privacy in context: Privacy issues in Ubiquitous Computing applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 827-837, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Mohamed Jawad, Patricia Serrano-Alvarado, Patrick Valduriez |
Design of PriServ, a privacy service for DHTs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAIS ![In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, Nantes, France, March 29, 2008, pp. 21-25, 2008, ACM, 978-1-59593-965-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Katherine Strater, Heather Richter |
Examining privacy and disclosure in a social networking community. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 157-158, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Alfred Kobsa |
Trustbus'07 Keynote Talk: Privacy Enhanced Personalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 1, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Mike Gurski |
From concept to commercialiazed product: the challenges of privacy technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 5, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Marco Casassa Mont, Siani Pearson, Robert Thyne |
A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 91-102, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Tony Vila, Rachel Greenstadt, David Molnar |
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003, pp. 403-407, 2003, ACM, 1-58113-788-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Sharman Lichtenstein, Paula M. C. Swatman, Kanchan Babu |
Adding Value to Online Privacy for Consumers: Remedying Deficiences in Online Privacy Policies with an Holistic Approac. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 206, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Joan Feigenbaum, Michael J. Freedman, Tomas Sander, Adam Shostack |
Privacy Engineering for Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 76-105, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Stuart Shapiro, Aaron Powell |
Analyzing PETs for Enterprise Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, pp. 1, 2008, Springer, 978-3-540-70629-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Gene Tsudik, Shouhuai Xu |
A Flexible Framework for Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 295-315, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Levente Buttyán, Tamás Holczer, István Vajda |
Optimal Key-Trees for Tree-Based Private Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 332-350, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Ralph Gross, Edoardo M. Airoldi, Bradley A. Malin, Latanya Sweeney |
Integrating Utility into Face De-identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 227-242, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao |
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 185-201, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, verification, integrity, secret sharing, outsource, Aggregate query |
33 | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari |
A practice-oriented framework for measuring privacy and utility in data sanitization systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT/ICDT Workshops ![In: Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010, ACM, 978-1-60558-990-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Kazumasa Yamamoto, Seiichi Nakagawa |
Privacy Protection for Speech Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 717-720, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Michael Carl Tschantz, Jeannette M. Wing |
Formal Methods for Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FM ![In: FM 2009: Formal Methods, Second World Congress, Eindhoven, The Netherlands, November 2-6, 2009. Proceedings, pp. 1-15, 2009, Springer, 978-3-642-05088-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas |
P2F: A User-Centric Privacy Protection Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 386-391, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Harold van Heerde, Maarten M. Fokkinga, Nicolas Anciaux |
A Framework to Balance Privacy and Data Usability Using Data Degradation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 146-153, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Lerone Banks, Shyhtsun Felix Wu |
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (4) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 970-974, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Nicolas Liampotis, Ioanna Roussaki, Elizabeth Papadopoulou, Yussuf Abu-Shaaban, M. Howard Williams, Nicholas K. Taylor, Sarah McBurney, Kajetan Dolinar |
A Privacy Framework for Personal Self-Improving Smart Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 444-449, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ken Barker 0001, Mina Askari, Mishtu Banerjee, Kambiz Ghazinour, Brenan Mackas, Maryam Majedi, Sampson Pun, Adepele Williams |
A Data Privacy Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Dataspace: The Final Frontier, 26th British National Conference on Databases, BNCOD 26, Birmingham, UK, July 7-9, 2009. Proceedings, pp. 42-54, 2009, Springer, 978-3-642-02842-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Wenbo He, Xue Liu 0001, Hoang Nguyen, Klara Nahrstedt |
A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 22-26 June 2009, Montreal, Québec, Canada, pp. 14-19, 2009, IEEE Computer Society, 978-0-7695-3660-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
Anonymizer-Enabled Security and Privacy for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 134-153, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Michael Hecker, Tharam S. Dillon, Elizabeth Chang 0001 |
Privacy Ontology Support for E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 12(2), pp. 54-61, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh P. Nguyen |
Managing privacy data in pervasive camera networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 1676-1679, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ting Wang 0006, Ling Liu 0001 |
Butterfly: Protecting Output Privacy in Stream Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 1170-1179, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Alfredo Cuzzocrea, Vincenzo Russo, Domenico Saccà |
A Robust Sampling-Based Framework for Privacy Preserving OLAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 10th International Conference, DaWaK 2008, Turin, Italy, September 2-5, 2008, Proceedings, pp. 97-114, 2008, Springer, 978-3-540-85835-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Peter Bodorik, Dawn N. Jutla |
Privacy with Web Serivces: Intelligence Gathering and Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia, pp. 546-549, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Aggelos Kiayias, Shouhuai Xu, Moti Yung |
Privacy Preserving Data Mining within Anonymous Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 57-76, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini |
RFID Privacy Models Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 251-266, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ye Zhu 0001, Yongjian Fu 0001, Huirong Fu |
On Privacy in Time Series Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 12th Pacific-Asia Conference, PAKDD 2008, Osaka, Japan, May 20-23, 2008 Proceedings, pp. 479-493, 2008, Springer, 978-3-540-68124-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Annie I. Antón, Julia Brande Earp, Matthew W. Vail, Neha Jain, Carrie M. Gheen, Jack M. Frink |
HIPAA's Effect on Web Site Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(1), pp. 45-52, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | E. Michael Power |
Developing a Culture of Privacy: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(6), pp. 58-60, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Gautham V. Pallapa, Mohan Kumar, Sajal K. Das 0001 |
Privacy Infusion in Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA, pp. 1-8, 2007, IEEE Computer Society, 978-1-4244-1024-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Yang Wang 0005, Alfred Kobsa |
Respecting Users' Individual Privacy Constraints in Web Personalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Modeling ![In: User Modeling 2007, 11th International Conference, UM 2007, Corfu, Greece, June 25-29, 2007, Proceedings, pp. 157-166, 2007, Springer, 978-3-540-73077-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Shuguo Han, Wee Keong Ng |
Privacy-Preserving Self-Organizing Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 9th International Conference, DaWaK 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 428-437, 2007, Springer, 978-3-540-74552-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Z. Yu, N. Zhang |
Achieving Privacy-preserving Computation on Data Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 763-768, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Yujie Niu |
Research on context-aware architecture for personal information privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 3912-3916, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Roman van der Krogt |
Privacy Loss in Classical Multiagent Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Silicon Valley, CA, USA, November 2-5, 2007, pp. 168-174, 2007, IEEE Computer Society, 0-7695-3027-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Qingsheng Zhang, Yong Qi, Di Hou, Jizhong Zhao, Huawei Han |
Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 3, pp. 156-160, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Vikram Goyal, Shyam K. Gupta 0001, Indira Meshram, Anand Gupta |
PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 90, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Steven Gevers, Bart De Decker |
Privacy Friendly Information Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 636-646, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Bin Mai, Nirup M. Menon, Sumit Sarkar |
Online Privacy at a Premium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
price premium, econometric models, trust |
33 | Shuchi Chawla 0001, Cynthia Dwork, Frank McSherry, Adam D. Smith, Hoeteck Wee |
Toward Privacy in Public Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 363-385, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jang Mook Kang, Jo Nam Jung, Jae Sang Cha, Chun su Lee |
A Study on Privacy-Related Considerations in Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 460-463, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Natasha Dubauskas |
Business Compliance to Changing Privacy Protections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Michael R. Nelson |
Enabling security, privacy, and transparency in an on dand world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, 2005, pp. 53, 2005, ACM, 1-59593-234-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Somesh Jha, Louis Kruger, Patrick D. McDaniel |
Privacy Preserving Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 397-417, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Elisa Bertino, Ji-Won Byun, Ninghui Li |
Privacy-Preserving Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 178-206, 2005, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Celal Öztürk, Yanyong Zhang, Wade Trappe, Maximilian Ott |
Source-Location Privacy for Networks of Energy-Constrained Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSTFEUS ![In: 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, WSTFEUS 2004, Vienna, Austria, May 11-12, 2004, pp. 68-72, 2004, IEEE Computer Society, 0-7695-2123-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Jean-Marc Seigneur, Christian Damsgaard Jensen |
Trading Privacy for Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings, pp. 93-107, 2004, Springer, 3-540-21312-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamoorthy Sivakumar |
On the Privacy Preserving Properties of Random Data Perturbation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 19-22 December 2003, Melbourne, Florida, USA, pp. 99-106, 2003, IEEE Computer Society, 0-7695-1978-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Rakesh Agrawal 0001 |
Privacy in data systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 9-12, 2003, San Diego, CA, USA, pp. 37, 2003, ACM, 1-58113-670-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Günter Karjoth, Matthias Schunter |
A Privacy Policy Model for Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 271-281, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis |
A Privacy-Enhancing e-Business Model Based on Infomediaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings, pp. 72-83, 2001, Springer, 3-540-42103-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baihua Zheng |
Navigational path privacy protection: navigational path privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 691-700, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy protection, road network, path search |
33 | Frank McSherry |
Privacy integrated queries: an extensible platform for privacy-preserving data analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, June 29 - July 2, 2009, pp. 19-30, 2009, ACM, 978-1-60558-551-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymization, confidentiality, differential privacy, linq |
33 | Bhume Bhumiratana, Matt Bishop |
Privacy aware data sharing: balancing the usability and privacy of datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009, Corfu, Greece, June 9-13, 2009, 2009, ACM, 978-1-60558-409-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ontology, privacy, information security, security policy, data sharing, data anonymization |
33 | Giovanni Iachello, Gregory D. Abowd |
From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Hum. Interact. ![In: ACM Trans. Comput. Hum. Interact. 15(2), pp. 8:1-8:30, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
proportionality, Privacy, ubiquitous computing, requirements analysis, design methods, risk analysis, social issues |
33 | Matthew M. Lucas, Nikita Borisov |
FlyByNight: mitigating the privacy risks of social networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 1-8, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, social networks |
33 | Keith B. Frikken, Yihua Zhang |
Yet another privacy metric for publishing micro-data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 117-122, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, generalization, data publishing |
33 | Anna Cinzia Squicciarini, Alexei Czeskis, Abhilasha Bhargav-Spantzel |
Privacy policies compliance across digital identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings, pp. 72-81, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, tracing, digital identity |
33 | Mahir Can Doganay, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi |
Distributed privacy preserving k-means clustering with additive secret sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAIS ![In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, Nantes, France, March 29, 2008, pp. 3-11, 2008, ACM, 978-1-59593-965-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secret sharing, k-means clustering, privacy preserving data mining, secure multiparty computation |
33 | Bastiaan van Loenen, Danielle Groetelaers, Jaap Zevenbergen, Jitske de Jong |
Privacy versus national security: The impact of privacy law on the use of location technology for national security purposes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AGILE Conf. ![In: The European Information Society: Leading the Way with Geo-information, Proceedings of the 10th AGILE Conference, Aalborg, Denmark, 8-11 May 2007, pp. 135-152, 2007, Springer, 978-3-540-72384-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
location technology, Location privacy, Europe, national security |
33 | Levente Buttyán, Tamás Holczer, István Vajda |
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 129-141, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
location privacy, vehicular ad hoc network, pseudonym |
33 | Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 67-72, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XML signature standard, verifiable random function, security, privacy, WS-security, federated identity management |
33 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Dynamic inference control in privacy preference enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 24, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy protection, dynamic bayesian networks, inference control, ubiquitous environments |
33 | Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks 0001 |
Privacy enhanced personalization in e-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 42, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, trust, personalization, anonymity, reputation, identity, pseudonymity |
33 | Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won |
RFID System with Fairness Within the Framework of Security and Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 142-152, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
uncheckable, security, privacy, RFID, Fairness, traceability |
33 | Ralph Gross, Alessandro Acquisti |
Information revelation and privacy in online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 71-80, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information revelation, online privacy, social networking sites |
33 | Sumit Joshi, Yuan Sun 0015, Poorvi L. Vora |
The privacy cost of the second-chance offer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 97-106, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, game theory, auctions |
33 | Arthur M. Keller, David Mertz, Joseph Lorenzo Hall, Arnold B. Urken |
Privacy issues in an electronic voting machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 33-34, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy design, open source, electronic voting |
32 | Rafae Bhatti, Arjmand Samuel, Mohamed Y. Eltabakh, Haseeb Amjad, Arif Ghafoor |
Engineering a Policy-Based System for Federated Healthcare Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 19(9), pp. 1288-1304, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Federated database security, healthcare engineering, role based access control, policy-based management |
32 | Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, Lorrie Faith Cranor |
Standardizing privacy notices: an online study of the nutrition label approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1573-1582, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, standardization, policy, information design, p3p |
32 | Andrew Besmer, Heather Richter Lipford |
Moving beyond untagging: photo privacy in a tagged world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1563-1572, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, facebook, social network sites, photo sharing |
32 | Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Giuseppe Bianchi 0001 |
Key escrow schemes with sliding window for privacy-aware anomaly detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT/ICDT Workshops ![In: Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010, ACM, 978-1-60558-990-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Shamir's scheme, privacy, sliding window, key revocation |
32 | Maxim Raya, Reza Shokri, Jean-Pierre Hubaux |
On the tradeoff between trust and privacy in wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 75-80, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, trust, game theory |
32 | Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Bandara, Bashar Nuseibeh |
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mobile computing, location based services, feedback, privacy management, social translucence |
32 | John Krumm |
A survey of computational location privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 13(6), pp. 391-399, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Context, Location |
32 | Hangzai Luo, Jianping Fan 0001, Xiaodong Lin 0004, Aoying Zhou, Elisa Bertino |
A distributed approach to enabling privacy-preserving model-based classifier training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 20(2), pp. 157-185, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy-preserving classifier training, Synthetic samples, Adaptive EM algorithm |
32 | Luca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone |
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 17(1), pp. 1-30, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security and privacy patterns, Legal requirements, Pattern validation, Healthcare, Organization |
32 | Shu Yang, Kanliang Wang |
The influence of information sensitivity compensation on privacy concern and behavioral intention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 40(1), pp. 38-51, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information sensitivity, privacy concern, compensation, behavioral intention |
32 | Mayank Bawa, Roberto J. Bayardo, Rakesh Agrawal 0001, Jaideep Vaidya |
Privacy-preserving indexing of documents on the network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 18(4), pp. 837-856, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Indexing, Distributed search |
32 | Yitao Duan |
Privacy without noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 1517-1520, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
simulatable query auditing, sum queries, differential privacy |
32 | Peter Tarasewich, Benjamin Ngugi, Mansi Sanghavi |
Exploring Employee Perspectives on Information Privacy and Security in the Mobile Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (8) ![In: Human Interface and the Management of Information. Designing Information Environments, Symposium on Human Interface 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Procceedings, Part I, pp. 171-180, 2009, Springer, 978-3-642-02555-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, mobile, context, organization, information |
32 | Giovanni Di Crescenzo, Richard J. Lipton |
Social Network Privacy via Evolving Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, 4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009. Proceedings, pp. 551-560, 2009, Springer, 978-3-642-03416-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Social Networking, Access Control, Utility |
32 | Xin Huang 0005, Yin He, Yifan Hou, Lisi Li, Lan Sun, Sina Zhang, Yang Jiang, Tingting Zhang |
Privacy of Value-Added Context-Aware Service Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings, pp. 547-552, 2009, Springer, 978-3-642-10664-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Cloud computing |
32 | Siani Pearson, Yun Shen, Miranda Mowbray |
A Privacy Manager for Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings, pp. 90-106, 2009, Springer, 978-3-642-10664-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, Cloud computing |
32 | Reza Shokri, Pedram Pedarsani, George Theodorakopoulos 0001, Jean-Pierre Hubaux |
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RecSys ![In: Proceedings of the 2009 ACM Conference on Recommender Systems, RecSys 2009, New York, NY, USA, October 23-25, 2009, pp. 157-164, 2009, ACM, 978-1-60558-435-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy-accuracy tradeoff, recommender systems |
32 | Alissa Cooper, John B. Morris |
Binding privacy rules to location on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LocWeb ![In: Proceedings of the Second International Workshop on Location and the Web, LocWeb 2009, Boston, MA, USA, April 4, 2009, pp. 3, 2009, ACM, 978-1-60558-457-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, policy, location |
32 | Zhengyi Le, Gauri Vakde, Matthew K. Wright |
PEON: privacy-enhanced opportunistic networks with applications in assistive environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009, Corfu, Greece, June 9-13, 2009, 2009, ACM, 978-1-60558-409-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, wireless, anonymity, opportunistic networks, pervasive |
32 | Simon Moncrieff, Svetha Venkatesh, Geoff A. W. West |
Dynamic privacy assessment in a smart house environment using multimodal sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 5(2), pp. 10:1-10:29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
surveillance and monitoring, privacy, context aware, audio, Assisted living |
32 | Charu C. Aggarwal, Philip S. Yu |
On static and dynamic methods for condensation-based privacy-preserving data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 33(1), pp. 2:1-2:39, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
databases data mining, Privacy, k-anonymity |
32 | Radu-Ioan Paise, Serge Vaudenay |
Mutual authentication in RFID: security and privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 292-299, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identification protocol, privacy, RFID |
32 | Stephen S. Yau, Yin Yin |
Controlled privacy preserving keyword search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 321-324, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, privacy preserving, keyword search |
32 | Caitlin Doyle Cottrill, Piyushimita Thakuriah |
GPS use by households: early indicators of privacy preferences regarding ubiquitous mobility information access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2008, July 21-25, 2008, Dublin, Ireland, 2008, ICST / ACM, 978-963-9799-27-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
household travel survey, ubiquitous location-based mobility access systems, vehicle infrastructure integration, privacy, GPS |
Displaying result #301 - #400 of 63336 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|