Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Cell suppression problem: A genetic-based approach
Computers and Operations Research
A Bayesian approach for on-line max and min auditing
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Safety in discretionary access control for logic-based publish-subscribe systems
Proceedings of the 14th ACM symposium on Access control models and technologies
Privacy-preserving genomic computation through program specialization
Proceedings of the 16th ACM conference on Computer and communications security
Providing K-Anonymity in location based services
ACM SIGKDD Explorations Newsletter
On finding an inference-proof complete database for controlled query evaluation
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Anonymity preserving techniques in trust negotiations
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |