|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11410 occurrences of 3224 keywords
|
|
|
Results
Found 63337 publication records. Showing 63336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Robyn R. Mace |
Intelligence, Dataveillance, and Information Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 34-44, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dataveillance, privacy, surveillance, intelligence, terrorism |
25 | James J. Horning |
Words Matter: Privacy, Security, and Related Terms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 57-62, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
freedom of speech, security, Privacy, network security, computer security, definitions, homeland security, national security |
25 | Florian Kerschbaum, Andreas Schaad |
Privacy-preserving social network analysis for criminal investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 9-14, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
criminal investigations, privacy, social network analysis, data sharing |
25 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 362-369, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
25 | Ernie Brickell, Jiangtao Li 0001 |
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 21-30, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocols, trusted computing |
25 | Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin |
Making p2p accountable without losing privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 31-40, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, peer-to-peer, anonymity, incentives, e-cash |
25 | Giovanni Iachello, Ian E. Smith, Sunny Consolvo, Mike Y. Chen, Gregory D. Abowd |
Developing privacy guidelines for social location disclosure applications and services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 65-76, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
people finder, social mobile applications, privacy, prototyping, iterative design |
25 | J. Alex Halderman, Brent R. Waters, Edward W. Felten |
Privacy management for portable recording devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 16-24, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
recording devices, privacy, camera phones |
25 | Julia Brande Earp, J. C. Poindexter, David L. Baumer |
Modeling privacy values with experimental economics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 25, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, experimental economics |
25 | Christine M. O'Keefe, Ming Yung, Lifang Gu, Rohan A. Baxter |
Privacy-preserving data linkage protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 94-102, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, confidentiality, data extraction, data linkage |
25 | Yuval Elovici, Bracha Shapira, Adlai Maschiach |
A new privacy model for hiding group interests while accessing the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 63-70, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
privacy, user-profile, Web-security, user-groups |
25 | Birgit Pfitzmann, Michael Waidner |
Privacy in browser-based attribute exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 52-62, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
BBAE, Liberty, attribute-exchange, e-Community Single Signon, single signon, traffic data, wallet, security, privacy, roles, web browser, identity management, SAML, Shibboleth, Passport |
25 | Bruno Gusmão Rocha, Virgílio A. F. Almeida, Lucila Ishitani, Wagner Meira Jr. |
Disclosing users' data in an environment that preserves privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 71-80, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
privacy, personalization, anonymization |
24 | Zachary Weinberg, Eric Yawei Chen, Pavithra Ramesh Jayaraman, Collin Jackson |
I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 147-161, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
browsing history, privacy, web security |
24 | Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich |
SCiFI - A System for Secure Face Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 239-254, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, face recognition, Secure computation |
24 | |
To change the world, take a chance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 54(1), pp. 6-7, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | |
UX design and agile: a natural fit? (Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 54(1), pp. 54-60, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | |
In the Virtual Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 54(1), pp. 8, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Tiancheng Li, Ninghui Li, Jian Zhang 0003 |
Modeling and Integrating Background Knowledge in Data Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 6-17, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Qing Zhang 0014, Nick Koudas, Divesh Srivastava, Ting Yu 0001 |
Aggregate Query Answering on Anonymized Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007, pp. 116-125, 2007, IEEE Computer Society, 1-4244-0802-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Chi-Yin Chow, Mohamed F. Mokbel |
Enabling Private Continuous Queries for Revealed User Locations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSTD ![In: Advances in Spatial and Temporal Databases, 10th International Symposium, SSTD 2007, Boston, MA, USA, July 16-18, 2007, Proceedings, pp. 258-275, 2007, Springer, 978-3-540-73539-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim |
Simulatable auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, USA, pp. 118-127, 2005, ACM, 1-59593-062-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Keng-Pei Lin, Ming-Syan Chen |
Privacy-preserving outsourcing support vector machines with random transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 363-372, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
classification, support vector machines, outsourcing, privacy-preserving data mining |
24 | Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma |
Collusion-resistant privacy-preserving data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 483-492, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data mining, privacy, distributed, secure multiparty computation, collusion |
24 | Hazem Elmeleegy, Mourad Ouzzani, Ahmed K. Elmagarmid, Ahmad M. Abusalah |
Preserving privacy and fairness in peer-to-peer data integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 759-770, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
peer-to-peer data integration, privacy, fairness, mappings, peer data management systems |
24 | Chao Li 0003, Michael Hay, Vibhor Rastogi, Gerome Miklau, Andrew McGregor 0001 |
Optimizing linear counting queries under differential privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2010, June 6-11, 2010, Indianapolis, Indiana, USA, pp. 123-134, 2010, ACM, 978-1-4503-0033-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
output perturbation, semidefinite program, differential privacy, private data analysis |
24 | Michael Maaser, Peter Langendörfer |
Privacy from Promises to Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 14(1), pp. 65-81, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy enhancing techniques, malicious host detection, location based services, covert channels, P3P |
24 | Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, Nikos Mamoulis |
A framework for efficient data anonymization under privacy and accuracy constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 34(2), pp. 9:1-9:47, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, anonymity |
24 | Clara Mancini, Keerthi Thomas, Yvonne Rogers, Blaine A. Price, Lukasz Jedrzejczyk, Arosha K. Bandara, Adam N. Joinson, Bashar Nuseibeh |
From spaces to places: emerging contexts in mobile privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2009: Ubiquitous Computing, 11th International Conference, UbiComp 2009, Orlando, Florida, USA, September 30 - October 3, 2009, Proceedings, pp. 1-10, 2009, ACM, 978-1-60558-431-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
contextual interview, memory phrase, mobile privacy, context, place, facebook, experience sampling |
24 | Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno |
A spotlight on security and privacy risks with future household robots: attacks and lessons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2009: Ubiquitous Computing, 11th International Conference, UbiComp 2009, Orlando, Florida, USA, September 30 - October 3, 2009, Proceedings, pp. 105-114, 2009, ACM, 978-1-60558-431-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
household robots, multi-robot attack, single-robot attack, security, privacy, robots, cyber-physical systems, domestic robots, ubiquitous robots |
24 | Benjamin C. M. Fung, Ming Cao, Bipin C. Desai, Heng Xu |
Privacy protection for RFID data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 1528-1535, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data mining, anonymity, information sharing, privacy protection, sensitive information |
24 | Anna Cinzia Squicciarini, Mohamed Shehab, Federica Paci |
Collective privacy management in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 521-530, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, social networks, game theory |
24 | Joseph T. Meyerowitz, Romit Roy Choudhury |
Hiding stars with fireworks: location privacy through camouflage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MOBICOM 2009, Beijing, China, September 20-25, 2009, pp. 345-356, 2009, ACM, 978-1-60558-702-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
camouflage, caching, entropy, location privacy, mobility prediction, realtime, location-based applications |
24 | Maryam Najafian Razavi, Lee Iverson |
Improving personal privacy in social systems with people-tagging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GROUP ![In: Proceedings of the 2009 International ACM SIGGROUP Conference on Supporting Group Work, GROUP 2009, Sanibel Island, Florida, USA, May 10-13, 2009, pp. 11-20, 2009, ACM, 978-1-60558-500-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
people-tagging, privacy, information sharing, social systems |
24 | Amre Shakimov, Alexander Varshavsky, Landon P. Cox, Ramón Cáceres |
Privacy, cost, and availability tradeoffs in decentralized OSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSN ![In: Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN 2009, Barcelona, Spain, August 17, 2009, pp. 13-18, 2009, ACM, 978-1-60558-445-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, cloud computing, virtual machines, replication, online social networks, utility computing |
24 | Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku |
PROS: a peer-to-peer system for location privacy protection on road networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, November 4-6, 2009, Seattle, Washington, USA, Proceedings, pp. 552-553, 2009, ACM, 978-1-60558-649-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
location privacy and spatial cloaking, location-based services |
24 | Julian Seifert, Alexander De Luca, Bettina Conradi |
A context-sensitive security model for privacy protection on mobile phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2009, Bonn, Germany, September 15-18, 2009, 2009, ACM, 978-1-60558-281-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, mobile phone, data security |
24 | Eun-Ae Cho, Chang-Joo Moon, Hyun-Soo Im, Doo-Kwon Baik |
An anonymous communication model for privacy-enhanced location based service using an echo agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 290-297, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
LBS (Location-Based Service), privacy, intelligent agent, heuristic algorithm, anonymous communication |
24 | Zakaria Maamar, Qusay H. Mahmoud, Nabil Sahli, Khouloud Boukadi |
Privacy-Aware Web Services in Smart Homes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOST ![In: Ambient Assistive Health and Wellness Management in the Heart of the City, 7th International Conference on Smart Homes and Health Telematics, ICOST 2009, Tours, France, July 1-3, 2009. Proceedings, pp. 174-181, 2009, Springer, 978-3-642-02867-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Web service, Privacy, Trust, Policy, Smart Home |
24 | Anour F. A. Dafa-Alla, Gyoyong Sohn, Keun Ho Ryu |
Employing PRBAC for privacy preserving data publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1416-1421, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data mining, privacy, access control, data publishing |
24 | Alissa Cooper |
A survey of query log privacy-enhancing techniques from a policy perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Web ![In: ACM Trans. Web 2(4), pp. 19:1-19:27, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, search, policy, query, log |
24 | Jaideep Vaidya, Murat Kantarcioglu, Chris Clifton |
Privacy-preserving Naïve Bayes classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 17(4), pp. 879-898, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Naïve Bayes, Security, Data mining, Privacy, Distributed computing |
24 | Rosie Jones, Ravi Kumar 0001, Bo Pang 0001, Andrew Tomkins |
Vanity fair: privacy in querylog bundles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 853-862, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
querylogs, privacy |
24 | Giuseppe Bianchi 0001, Simone Teofili, Matteo Pomposini |
New directions in privacy-preserving anomaly detection for network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 11-18, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
counting bloom filters, anomaly detection, privacy-preserving, traffic measurement |
24 | Kaoru Kurosawa, Takeshi Koshiba |
Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITS ![In: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings, pp. 199-209, 2008, Springer, 978-3-540-85092-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
deterministic randomness extractor, reduction, oblivious transfer, privacy amplification |
24 | Qingkai Ma, Ping Deng |
Secure Multi-party Protocols for Privacy Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings, pp. 526-537, 2008, Springer, 978-3-540-88581-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy preserving data mining, secure multiparty computation |
24 | Peter Langendörfer, Michael Maaser |
Privacy guaranteeing execution containers: one time use of personal data by location based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILWARE ![In: Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE 2008, Innsbruck, Austria, February 13 - 15, 2008, pp. 18, 2008, 978-1-59593-984-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy enhancing techniques, location based services, P3P |
24 | Chunhua Su, Feng Bao 0001, Jianying Zhou 0001, Tsuyoshi Takagi, Kouichi Sakurai |
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 112-119, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy-preserving, data clustering, RDP |
24 | Yuh-Jong Hu, Hong-Yi Guo, Guang-De Lin |
Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), 11-13 June 2008, Taichung, Taiwan, pp. 400-407, 2008, IEEE Computer Society, 978-0-7695-3158-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ontology, semantic web, rule, privacy protection, web 3.0, semantic email |
24 | Khaled Ouafi, Raphael C.-W. Phan |
Traceable Privacy of Recent Provably-Secure RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 479-489, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Authentication protocols, Untraceability |
24 | Chi-Yin Chow, Mohamed F. Mokbel, Tian He 0001 |
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 1307-1310, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
aggregate location monitoring systems, aggregate query processing, wireless sensor networks, location privacy, location anonymization |
24 | Gerardo Canfora, Corrado Aaron Visaggio |
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 961-966, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
front end trust filter, data privacy |
24 | Gyözö Gidófalvi, Xuegang Huang, Torben Bach Pedersen |
Privacy: preserving trajectory collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2008, November 5-7, 2008, Irvine, California, USA, Proceedings, pp. 46, 2008, ACM, 978-1-60558-323-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data cloaking, data swapping, data mining, privacy, anonymity, P2P, LBS, diversity, moving object trajectories |
24 | Annamaria Chiasera, Fabio Casati, Florian Daniel, Yannis Velegrakis |
Engineering Privacy Requirements in Business Intelligence Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 219-228, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
meta-reports, privacy, outsourcing, provenance, business intelligence, compliance, reports |
24 | Barbara Carminati, Elena Ferrari |
Privacy-Aware Collaborative Access Control in Web-Based Social Networks. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 81-96, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy-preserving data management, Web-based Social Networks, Collaborative access control |
24 | Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe |
A Privacy-Preserving Ticketing System. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 97-112, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Electronic Identity cards, Security, Privacy, Anonymity, Ticketing |
24 | Emre Kaplan, Thomas Brochmann Pedersen, Erkay Savas, Yücel Saygin |
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II, pp. 642-649, 2008, Springer, 978-3-540-85564-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data mining, Privacy, trajectories, Spatio-temporal data |
24 | Batya Friedman, Kristina Höök, Brian T. Gill, Lina Eidmar, Catherine Sallmander Prien, Rachel L. Severson |
Personlig integritet: a comparative study of perceptions of privacy in public places in Sweden and the United States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordiCHI ![In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction 2008, Lund, Sweden, October 20-22, 2008, pp. 142-151, 2008, ACM, 978-1-59593-704-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
indirect stakeholders, public place, privacy, value sensitive design, human values, informed consent, user conceptions |
24 | Takao Kojima, Yukio Itakura |
Proposal of privacy policy matching engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 9-14, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identity-related data, vendor relationship management, search engine, privacy policy |
24 | Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin |
Rethinking accountable privacy supporting services: extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 1-8, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems |
24 | JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha |
A New Formal Proof Model for RFID Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 267-281, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
formal proof model, location privacy, RFID security |
24 | Stefano Braghin, Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari, Alberto Trombetta |
Introducing privacy in a hospital information system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS ![In: Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, SESS 2008, Leipzig, Germany, May 17-18, 2008, pp. 9-16, 2008, ACM, 978-1-60558-042-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software engineering applications, conceptual models, privacy policies, hospital information system |
24 | Justin Zhan, Gary Blosser, Christopher C. Yang, Lisa Singh |
Privacy-Preserving Collaborative Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 114-125, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Privacy, Social Networks |
24 | Jun Sakuma, Shigenobu Kobayashi |
Large-Scale k-Means Clustering with User-Centric Privacy Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 12th Pacific-Asia Conference, PAKDD 2008, Osaka, Japan, May 20-23, 2008 Proceedings, pp. 320-332, 2008, Springer, 978-3-540-68124-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data mining, clustering, privacy, peer-to-peer, k-means |
24 | Mansoor Ahmed, Amin Anjomshoaa, A Min Tjoa |
Context-based privacy management of personal information using semantic desktop: SemanticLIFE case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 214-221, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
context-based, ontology, web services, privacy, semantic web, SOA |
24 | Winnie Cheng, Jun Li 0008, Keith Moore, Alan H. Karp |
A Customer-Centric Privacy Protection Framework for Mobile Service-Oriented Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC (2) ![In: 2008 IEEE International Conference on Services Computing (SCC 2008), 8-11 July 2008, Honolulu, Hawaii, USA, pp. 13-20, 2008, IEEE Computer Society, 978-0-7695-3283-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Mobile Computing, Service-Oriented Architectures, Access Control |
24 | Vijaykumar Rachamadugu, John A. Anderson |
Managing Security and Privacy Integration across Enterprise Business Process and Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC (2) ![In: 2008 IEEE International Conference on Services Computing (SCC 2008), 8-11 July 2008, Honolulu, Hawaii, USA, pp. 351-358, 2008, IEEE Computer Society, 978-0-7695-3283-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
enterprise security, enterprise privacy, business process security, RISE, risk-management |
24 | Karima Mokhtari, Salima Benbernou, Mohand-Said Hacid, Emmanuel Coquery, Frank Leymann |
Verification of Privacy Timed Properties in Web Service Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC (2) ![In: 2008 IEEE International Conference on Services Computing (SCC 2008), 8-11 July 2008, Honolulu, Hawaii, USA, pp. 593-594, 2008, IEEE Computer Society, 978-0-7695-3283-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
timed-related properties, privacy, business protocol |
24 | Stephen E. Fienberg, Yuval Nardi, Aleksandra B. Slavkovic |
Valid Statistical Analysis for Logistic Regression with Multiple Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 82-94, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Horizontal Partitioned Data, Secure Logistic Regression, Vertical Partitioned Data, Distributed Databases, Privacy Preserving Data Mining, Log-linear models |
24 | Alina Campan, Traian Marius Truta |
Data and Structural k-Anonymity in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers, pp. 33-54, 2008, Springer, 978-3-642-01717-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Social Networks, K-Anonymity, Information Loss |
24 | Xiaolan Joy Zhang, Brian King |
An Anti-Counterfeiting RFID Privacy Protection Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(3), pp. 438-448, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, integrity, RFID security |
24 | Jason I. Hong, Mahadev Satyanarayanan, George Cybenko |
Guest Editors' Introduction: Security & Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 6(4), pp. 15-17, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, pervasive computing |
24 | Kui Ren 0001, Wenjing Lou |
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 12(1), pp. 79-92, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pervasive computing environment (PCE), context authentication, security, privacy, access control |
24 | Li Xiong 0001, Subramanyam Chitti, Ling Liu 0001 |
Preserving data privacy in outsourcing data aggregation services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 7(3), pp. 17, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
classification, Privacy, confidentiality, outsourcing |
24 | Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. Hong |
Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2007: Ubiquitous Computing, 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings, pp. 91-108, 2007, Springer, 978-3-540-74852-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Contextual instant messaging, privacy, context-aware, IM |
24 | Baik Hoh, Marco Gruteser, Hui Xiong 0001, Ansaf Alrabady |
Preserving privacy in gps traces via uncertainty-aware path cloaking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 161-171, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, gps, traffic |
24 | Maithili Narasimha, Gene Tsudik |
Privacy-Preserving Revocation Checking with Modified CRLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 18-33, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anonymity and Privacy, Certificate Revocation |
24 | Carsten Röcker, Carsten Magerkurth |
Privacy and Interruptions in Team Awareness Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (5) ![In: Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I, pp. 273-283, 2007, Springer, 978-3-540-73278-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Team Awareness Systems, Dual Trade-Off, Privacy, Evaluation, Interruptions |
24 | Jun-Lin Lin, Julie Yu-Chih Liu |
Privacy preserving itemset mining through fake transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 375-379, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
association rules, privacy preserving data mining |
24 | Yabo Xu, Ke Wang 0001, Benyu Zhang, Zheng Chen 0001 |
Privacy-enhancing personalized web search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 591-600, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hierarchical user profile, privacy, personalized search |
24 | Stephen S. Yau, Junwei Liu |
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 1056-1063, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SOA-based systems, situationaware access control, Service-oriented architecture, privacy-preserving, service matchmaking |
24 | Xiaokui Xiao, Yufei Tao 0001 |
M-invariance: towards privacy preserving re-publication of dynamic datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pp. 689-700, 2007, ACM, 978-1-59593-686-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
m-invariance, privacy, generalization |
24 | Monica Scannapieco, Ilya Figotin, Elisa Bertino, Ahmed K. Elmagarmid |
Privacy preserving schema and data matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pp. 653-664, 2007, ACM, 978-1-59593-686-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, record matching |
24 | Steffen Ortmann, Peter Langendörfer, Michael Maaser |
A self-configuring privacy management architecture for pervasive systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBIWAC ![In: Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2007, Chania, Crete Island, Greece, October 22, 2007, pp. 184-187, 2007, ACM, 978-1-59593-809-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
management of ubiquitous environments, privacy, middleware, context awareness, mobile devices, location based services |
24 | Rachid Hamadi, Hye-Young Paik, Boualem Benatallah |
Conceptual Modeling of Privacy-Aware Web Service Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 19th International Conference, CAiSE 2007, Trondheim, Norway, June 11-15, 2007, Proceedings, pp. 233-248, 2007, Springer, 978-3-540-72987-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web services, conceptual modeling, privacy policies |
24 | Landon P. Cox, Angela Dalton, Varun Marupadi |
SmokeScreen: flexible privacy controls for presence-sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, pp. 233-245, 2007, ACM, 978-1-59593-614-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
presence-sharing, mobile computing, social networks, pervasive computing, location privacy |
24 | Seung-Woo Kim, Sanghyun Park 0003, Jung-Im Won, Sang-Wook Kim |
Privacy Preserving Data Mining of Sequential Patterns for Network Traffic Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 201-212, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data mining, Privacy, Sequential pattern, Network traffic |
24 | Xiaodan Wu, Chao-Hsien Chu, Yunfeng Wang, Fengli Liu, Dianmin Yue |
Privacy Preserving Data Mining Research: Current Status and Key Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 762-772, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data mining, Privacy preserving |
24 | Chun-I Fan, Vincent Shi-Ming Huang |
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 412-427, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication |
24 | Robert W. Reeder, Clare-Marie Karat, John Karat, Carolyn Brodie |
Usability Challenges in Security and Privacy Policy-Authoring Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (2) ![In: Human-Computer Interaction - INTERACT 2007, 11th IFIP TC 13 International Conference, Rio de Janeiro, Brazil, September 10-14, 2007, Proceedings, Part II, pp. 141-155, 2007, Springer, 978-3-540-74799-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, usability, Policy, policy-authoring |
24 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Fragmentation and Encryption to Enforce Privacy in Data Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 171-186, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy, encryption, fragmentation |
24 | Cynthia Dwork, Frank McSherry, Kunal Talwar |
The price of privacy and the limits of LP decoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 85-94, 2007, ACM, 978-1-59593-631-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
LP decoding, privacy, compressed sensing, basis pursuit |
24 | Patrick C. K. Hung, Jude Andrade, Yongming Chen, Ranny Huang, Miguel Vargas Martin, Yi Zheng |
Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 582-587, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy, mobile ad-hoc network, Role Based Access Control, XACML, Healthcare Applications |
24 | Chunhua Su, Feng Bao 0001, Jianying Zhou 0001, Tsuyoshi Takagi, Kouichi Sakurai |
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 385-391, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure approximation, clustering, privacy-preserving |
24 | Roberto Speicys Cardoso, Sonia Ben Mokhtar, Aitor Urbieta, Valérie Issarny |
EVEY: enhancing privacy of service discovery in pervasive computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware (Demos and Posters) ![In: Middleware 2007, ACM/IFIP/USENIX 8th International Middleware Conference, Newport Beach, CA, USA, November 26-30, 2007, Demos and Posters Proceedings, pp. 27, 2007, ACM, 978-1-59593-935-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
syntactic match, privacy, pervasive computing, service discovery, semantic match |
24 | Yingpeng Sang, Hong Shen 0001 |
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), 3-6 December 2007, Adelaide, Australia, pp. 461-468, 2007, IEEE Computer Society, 0-7695-3049-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy preserva- tion, distributed datasets, cryptographic protocol, zero-knowledge proof, set intersection |
24 | Felipe Saint-Jean, Aaron Johnson 0001, Dan Boneh, Joan Feigenbaum |
Private web search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 84-90, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
PWS, privacy, anonymity, web search, tor, firefox |
24 | Marina Blanton, Mikhail J. Atallah |
Succinct representation of flexible and privacy-preserving access rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 15(4), pp. 334-354, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy-preserving access rights, Flexible access rights, Compact representation |
24 | Umesh Shankar, Chris Karlof |
Doppelganger: Better browser privacy without the bother. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 154-167, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
web privacy, usable security, cookies |
24 | Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana |
Privacy-preserving demographic filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 872-878, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
demographic filtering, semi-trusted third party, clustering, architecture, recommender system, e-commerce, privacy protection |
|
|