Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1632709guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
2009 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
August 29 - 31, 2009
ISBN:
978-0-7695-3823-5
Published:
29 August 2009

Reflects downloads up to 16 Dec 2024Bibliometrics
Abstract

No abstract available.

Article
Article
Noise Injection for Search Privacy Protection

To protect user privacy in the search engine context, most current approaches, such as private information retrieval and privacy preserving data mining, require a server-side deployment, thus users have little control over their data and privacy. In ...

Article
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data

Construction of learning structures for Bayesian Networks is considered in this work when data is securely maintained by different parties, not willing to reveal their individual private data to each other. We propose a privacy-preserving protocol for ...

Article
Privacy-Preserving Multi-agent Constraint Satisfaction

Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context involving multiple agents, and protecting privacy of information among them is ...

Article
FaceCloak: An Architecture for User Privacy on Social Networking Sites

Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports ...

Article
Adapting Privacy-Preserving Computation to the Service Provider Model

There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue.One reason is that the business model of the application does not match the system architecture of regular secure computation.An important ...

Article
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach

In this paper, we propose a taxonomy of privacy-related information-hiding/disclosure properties in terms of the modal logic of knowledge for multiagent systems. The properties considered here are anonymity, privacy, onymity, and identity. Intuitively, ...

Article
Privacy-Enhanced Event Scheduling

Event schedulers, well-known from groupware and social software, typicallyshare the problem that they disclose detailed availability patterns of theirusers.This paper distinguishes event scheduling from electronic voting andproposes a privacy-enhanced ...

Article
Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design

This paper explores the adage that good privacy is good business. Businesses, like social networks, often seek to create value from personal information and monetize it. Unlocking and harvesting value embedded in personal information can lead to ...

Article
t-Plausibility: Semantic Preserving Text Sanitization

Text documents play significant roles in decision making and scientific research. Under federal regulations, documents (e.g., pathology records) containing personally identifiable information cannot be shared freely, unless properly sanitized. Generally ...

Article
Policy-Based Malicious Peer Detection in Ad Hoc Networks

Mobile Ad hoc Networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been ...

Article
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems

Intrusion Detection and Response Systems have become a core component in modern security architectures. Current researches are combining intrusion detection and response systems with risk analysis or cost-sensitive approaches to enhance the detection ...

Article
Tuning Evidence-Based Trust Models

Many evidence-based trust models require the adjustment of parameters such as aging- or exploration-factors. What the literature often does not address is the systematic choice of these parameters. In our work, we propose a generic procedure for finding ...

Article
Trust Is in the Eye of the Beholder

We carefully investigate humanity's intuitive understanding of trust and extract from it fundamental properties that succinctly synthesize how trust works. From this detailed characterization we propose a formal, complete and intuitive definition of ...

Article
A Trust-Based Multiagent System

Cooperative agent systems often do not account for sneaky agents who are willing to cooperate when the stakes are low and take selfish, greedy actions when the rewards rise. Trust modeling often focuses on identifying the appropriate trust level for the ...

Article
Towards Automating Social Engineering Using Social Networking Sites

A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a users' privacy and arising implications are often neglected. In this paper ...

Article
Social Inference Risk Modeling in Mobile and Social Applications

The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk results from social inferences about user identity, location and other personal ...

Article
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans

Modern consumerwireless devices are increasingly powerful, making them attractive touse as wireless sensor nodes.At the same time, many use protocolsuites such as Bluetooth which require devices to reveal data that maymake for unique device ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations