No abstract available.
Noise Injection for Search Privacy Protection
To protect user privacy in the search engine context, most current approaches, such as private information retrieval and privacy preserving data mining, require a server-side deployment, thus users have little control over their data and privacy. In ...
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data
Construction of learning structures for Bayesian Networks is considered in this work when data is securely maintained by different parties, not willing to reveal their individual private data to each other. We propose a privacy-preserving protocol for ...
Privacy-Preserving Multi-agent Constraint Satisfaction
Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context involving multiple agents, and protecting privacy of information among them is ...
FaceCloak: An Architecture for User Privacy on Social Networking Sites
Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports ...
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue.One reason is that the business model of the application does not match the system architecture of regular secure computation.An important ...
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
In this paper, we propose a taxonomy of privacy-related information-hiding/disclosure properties in terms of the modal logic of knowledge for multiagent systems. The properties considered here are anonymity, privacy, onymity, and identity. Intuitively, ...
Privacy-Enhanced Event Scheduling
Event schedulers, well-known from groupware and social software, typicallyshare the problem that they disclose detailed availability patterns of theirusers.This paper distinguishes event scheduling from electronic voting andproposes a privacy-enhanced ...
Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design
This paper explores the adage that good privacy is good business. Businesses, like social networks, often seek to create value from personal information and monetize it. Unlocking and harvesting value embedded in personal information can lead to ...
t-Plausibility: Semantic Preserving Text Sanitization
Text documents play significant roles in decision making and scientific research. Under federal regulations, documents (e.g., pathology records) containing personally identifiable information cannot be shared freely, unless properly sanitized. Generally ...
Policy-Based Malicious Peer Detection in Ad Hoc Networks
Mobile Ad hoc Networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been ...
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems
Intrusion Detection and Response Systems have become a core component in modern security architectures. Current researches are combining intrusion detection and response systems with risk analysis or cost-sensitive approaches to enhance the detection ...
Tuning Evidence-Based Trust Models
Many evidence-based trust models require the adjustment of parameters such as aging- or exploration-factors. What the literature often does not address is the systematic choice of these parameters. In our work, we propose a generic procedure for finding ...
Trust Is in the Eye of the Beholder
We carefully investigate humanity's intuitive understanding of trust and extract from it fundamental properties that succinctly synthesize how trust works. From this detailed characterization we propose a formal, complete and intuitive definition of ...
A Trust-Based Multiagent System
Cooperative agent systems often do not account for sneaky agents who are willing to cooperate when the stakes are low and take selfish, greedy actions when the rewards rise. Trust modeling often focuses on identifying the appropriate trust level for the ...
Towards Automating Social Engineering Using Social Networking Sites
A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a users' privacy and arising implications are often neglected. In this paper ...
Social Inference Risk Modeling in Mobile and Social Applications
The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk results from social inferences about user identity, location and other personal ...
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans
Modern consumerwireless devices are increasingly powerful, making them attractive touse as wireless sensor nodes.At the same time, many use protocolsuites such as Bluetooth which require devices to reveal data that maymake for unique device ...