Social information filtering: algorithms for automating “word of mouth”
CHI '95 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Communications of the ACM
Recommendation Systems: A Probabilistic Analysis
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Algorithms, games, and the internet
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Competitive recommendation systems
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Quantifying Privacy Leakage through Answering Database Queries
ISC '02 Proceedings of the 5th International Conference on Information Security
Randomization in privacy preserving data mining
ACM SIGKDD Explorations Newsletter
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
Marginal contribution nets: a compact representation scheme for coalitional games
Proceedings of the 6th ACM conference on Electronic commerce
Model-based overlapping clustering
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
IEEE Security and Privacy
PeCAN: an architecture for users' privacy-aware electronic commerce contexts on the semantic web
Information Systems - Special issue: The semantic web and web services
Mobile Identity Management: An Enacted View
International Journal of Electronic Commerce
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Robust methods for databases and robotics
ISPRA'05 Proceedings of the 4th WSEAS International Conference on Signal Processing, Robotics and Automation
A privacy expectations and security assurance offer system
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Application of ε -testers algorithms under sketch calculation model in robot navigation problem
ICS'09 Proceedings of the 13th WSEAS international conference on Systems
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Qualitative analysis of user-based and item-based prediction algorithms for recommendation agents
Engineering Applications of Artificial Intelligence
Application of Ɛ-testers algorithms under sketch and streaming calculation model in robot navigation
WSEAS Transactions on Computers
The sisterhood of the traveling packets
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
A utility-theoretic approach to privacy in online services
Journal of Artificial Intelligence Research
When do firms invest in privacy-preserving technologies?
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Robust methods for databases and robotics
SMO'05 Proceedings of the 5th WSEAS international conference on Simulation, modelling and optimization
Proceedings of the 12th ACM conference on Electronic commerce
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
Towards a mechanism for incentivating privacy
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
On honesty in sovereign information sharing
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
ACM SIGCOMM Computer Communication Review
Using personal portfolios to manage customer data
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Privacy consensus in anonymization systems via game theory
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Privacy and coordination: computing on databases with endogenous participation
Proceedings of the fourteenth ACM conference on Electronic commerce
Hi-index | 0.00 |
As individuals increasingly take advantage of on-line services, the value of the private information they possess emerges as a problem of fundamental concern. We believe that the principle underlying privacy should be simple: Individuals are entitled to control the dissemination of private information, disclosing it as part of a transaction only when they are fairly compensated. We show how this principle can be made precise in several diverse settings --- in the use of marketing surveys by a vendor designing a product; and in the design of collaborative filtering and recommendation systems, where we seek to quantify the value of each user's participation. Our approach draws on the analysis of coalitional games, making use of the core and Shapley value of such games as fair allocation principles.