-
1
-
-
85136049562
-
Enabling privacy for the paranoids
-
M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, Toronto, Canada, August 31-September 3, Morgan Kaufmann
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, N. Mishra, R. Motwani, U. Srivastava, D. Thomas, J. Widom, and Y. Xu. Enabling privacy for the paranoids. In M. A. Nascimento, M. T. Özsu, D. Kossmann, R. J. Miller, J. A. Blakeley, and K. B. Schiefer, editors, Proceedings of the 13th International Conference on Very Large Data Bases, pages 708-719, Toronto, Canada, August 31-September 3 2004. Morgan Kaufmann.
-
(2004)
Proceedings of the 13th International Conference on Very Large Data Bases
, pp. 708-719
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Mishra, N.6
Motwani, R.7
Srivastava, U.8
Thomas, D.9
Widom, J.10
Xu, Y.11
-
2
-
-
34547321497
-
Bayesian network privacy intrusion detection
-
Technical report, Faculty of Computer Science, Dalhousie University, NS, Canada
-
X. An, D. Jutla, and N. Gereone. Bayesian network privacy intrusion detection. Technical report, Faculty of Computer Science, Dalhousie University, NS, Canada, 2006.
-
(2006)
-
-
An, X.1
Jutla, D.2
Gereone, N.3
-
3
-
-
34250757477
-
A roadmap for comprehensive online privacy policy
-
Technical report, CERIAS, Purdue University, West Lafayette, CERIAS-2004-47
-
A. I. Antón, E. Bertino, N. Li, and T. Yu. A roadmap for comprehensive online privacy policy. Technical report, CERIAS, Purdue University, West Lafayette, CERIAS-2004-47, 2004.
-
(2004)
-
-
Antón, A.I.1
Bertino, E.2
Li, N.3
Yu, T.4
-
4
-
-
26944464568
-
A comparison of HMMs and dynamic Bayesian networks for recognizing office activities
-
L. Ardissono, P. Brna, and A. Mitrovic, editors, of, Edinburgh, Scotland, UK, July 24-29, Springer
-
L. Ardissono, P. Brna, and A. Mitrovic, editors. A comparison of HMMs and dynamic Bayesian networks for recognizing office activities, volume 3538 of Lecture Notes in Computer Science (LNCS), Edinburgh, Scotland, UK, July 24-29 2005. Springer.
-
(2005)
Lecture Notes in Computer Science
, vol.3538
-
-
-
5
-
-
24944578141
-
Enterprise privacy authorization language (EPAL 1.2)
-
Technical report, W3C Member Submission, November
-
P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter. Enterprise privacy authorization language (EPAL 1.2). Technical report, W3C Member Submission, http://www.w3.org/Submission/2003/SUBM-EPAL-20031110, November 2003.
-
(2003)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
6
-
-
0037703469
-
E-P3P privacy policies and privacy authorization
-
Washington, DC, USA, November 21
-
P. Ashley, S. Hada, G. Karjoth, and M. Schunter. E-P3P privacy policies and privacy authorization. In Proceedings of Workshop on Privacy in the Electronic Society (WPES'02), pages 103-109, Washington, DC, USA, November 21 2002.
-
(2002)
Proceedings of Workshop on Privacy in the Electronic Society (WPES'02)
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
7
-
-
20444460387
-
Conflict and combination in privacy policy languages
-
Washington, DC, USA, October 28, ACM Press
-
A. Barth, J. C. Mitchell, and J. Rosenstein. Conflict and combination in privacy policy languages. In Proceedings of Workshop on Privacy in the Electronic Society (WPES'04), Washington, DC, USA, October 28 2004. ACM Press.
-
(2004)
Proceedings of Workshop on Privacy in the Electronic Society (WPES'04)
-
-
Barth, A.1
Mitchell, J.C.2
Rosenstein, J.3
-
8
-
-
33745005053
-
An audit logic for accountability
-
A. Sahai and W. H. Winsborough, editors, Stockholm, Sweden, June 6-8, IEEE Computer Society
-
J. G. Cederquist, R. Corin, M. A. C. Dekker, S. Etalle, and J. I. den Hartog. An audit logic for accountability. In A. Sahai and W. H. Winsborough, editors, Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pages 34-43, Stockholm, Sweden, June 6-8 2005. IEEE Computer Society.
-
(2005)
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05)
, pp. 34-43
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.I.5
-
9
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
S. Chebrolu, A. Abraham, and J. P. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4):295-307, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
10
-
-
70450137679
-
-
P. R. ClearingHouse. Privacy today: A review of current issues. Technical report, Privacy Rights Clearinghouse, San Diego, CA, USA. http://www. privacyrights.org, 2002.
-
P. R. ClearingHouse. Privacy today: A review of current issues. Technical report, Privacy Rights Clearinghouse, San Diego, CA, USA. http://www. privacyrights.org, 2002.
-
-
-
-
11
-
-
0013243382
-
The platform for privacy preferences 1.0 (P3P 1.0) specification
-
Technical report, W3C Recommendation, April
-
L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle. The platform for privacy preferences 1.0 (P3P 1.0) specification. Technical report, W3C Recommendation, http://www.w3.org/TR/P3P, April 2002.
-
(2002)
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
12
-
-
0001781779
-
Dynamic network models for forecasting
-
D. Dubois, M. P. Wellman, B. D'Ambrosio, and P. Smets, editors, Stanford, CA, USA, Morgan Kaufmann Publishers
-
P. Dagum, A. Galper, and E. Horvitz. Dynamic network models for forecasting. In D. Dubois, M. P. Wellman, B. D'Ambrosio, and P. Smets, editors, Proceedings of the 8th Conference on Uncertainty in Artificial Intelligence (UAI-1992), pages 41-48, Stanford, CA, USA, 1992. Morgan Kaufmann Publishers.
-
(1992)
Proceedings of the 8th Conference on Uncertainty in Artificial Intelligence (UAI-1992)
, pp. 41-48
-
-
Dagum, P.1
Galper, A.2
Horvitz, E.3
-
13
-
-
0002371189
-
Uncertain reasoning and forescasting
-
P. Dagum, A. Galper, E. Horvitz, and A. Seiver. Uncertain reasoning and forescasting. International Journal of Forecasting, 11(1):73-87, 1995.
-
(1995)
International Journal of Forecasting
, vol.11
, Issue.1
, pp. 73-87
-
-
Dagum, P.1
Galper, A.2
Horvitz, E.3
Seiver, A.4
-
15
-
-
0020779363
-
Inference control for statistical databases
-
D. E. Denning and J. Schlörer. Inference control for statistical databases. IEEE Computer, 16(7):69-82, 1983.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlörer, J.2
-
16
-
-
70450120509
-
-
EPIC and PI. Privacy & human rights: An international survey of privacy laws and developments. Technical report, Electronic Privacy Information Center (EPIC), Washington, DC, USA, http://www.epic.org, and Privacy International (PI), London, UK, http://www.privacyinternational.org, 2004.
-
EPIC and PI. Privacy & human rights: An international survey of privacy laws and developments. Technical report, Electronic Privacy Information Center (EPIC), Washington, DC, USA, http://www.epic.org, and Privacy International (PI), London, UK, http://www.privacyinternational.org, 2004.
-
-
-
-
17
-
-
70450158038
-
-
EXOCOM. Privacy technology review. Technical report, Business Strategy and IT Consulting Division, The EXOCOM Group Inc. (for the Office of Health and the Information Highway, Health Canada), 2001.
-
EXOCOM. Privacy technology review. Technical report, Business Strategy and IT Consulting Division, The EXOCOM Group Inc. (for the Office of Health and the Information Highway, Health Canada), 2001.
-
-
-
-
20
-
-
26844488270
-
Paid: A probabilistic agent-based intrusion detection system
-
October
-
V. Gowadia, C. Farkas, and M. Valtorta. Paid: A probabilistic agent-based intrusion detection system. Computers & Security, 24(7):529-545, October 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.7
, pp. 529-545
-
-
Gowadia, V.1
Farkas, C.2
Valtorta, M.3
-
21
-
-
20444440033
-
Privacy management for portable recording devices
-
Washington, DC, USA, October 28
-
J. A. Halderman, B. Waters, and E. W. Felten. Privacy management for portable recording devices. In Proceedings of Workshop on Privacy in the Electronic Society (WPES'04), pages 16-24, Washington, DC, USA, October 28 2004.
-
(2004)
Proceedings of Workshop on Privacy in the Electronic Society (WPES'04)
, pp. 16-24
-
-
Halderman, J.A.1
Waters, B.2
Felten, E.W.3
-
22
-
-
0041467002
-
Probabilistic temporal reasoning with endogenous change
-
P. Besnard and S. Hanks, editors, Montréal, Québec, Canada, August 18-20, Morgan Kaufmann Publishers
-
S. Hanks, D. Madigan, and J. Gavrin. Probabilistic temporal reasoning with endogenous change. In P. Besnard and S. Hanks, editors, Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI-1995), Montréal, Québec, Canada, August 18-20 1995. Morgan Kaufmann Publishers.
-
(1995)
Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI-1995)
-
-
Hanks, S.1
Madigan, D.2
Gavrin, J.3
-
23
-
-
34547336952
-
Computers and privacy: A survey
-
June
-
L. J. Huffman. Computers and privacy: A survey. Computing Surveys, 1(2):85-103, June 1969.
-
(1969)
Computing Surveys
, vol.1
, Issue.2
, pp. 85-103
-
-
Huffman, L.J.1
-
24
-
-
0013270513
-
Database security and privacy
-
March
-
S. Jajodia. Database security and privacy. ACM Computing Surveys, 28(1):129-131, March 1996.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.1
, pp. 129-131
-
-
Jajodia, S.1
-
25
-
-
33845255358
-
Network security: Bayesian network intrusion detection
-
Technical report, Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA
-
K. Johansen and S. Lee. Network security: Bayesian network intrusion detection. Technical report, Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA, 2003.
-
(2003)
-
-
Johansen, K.1
Lee, S.2
-
28
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
LasVegas, Nevada, USA, December 08-12
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Bayesian event classification for intrusion detection. In Proceedings of the 19th Annual Computer Security Applications Conference, LasVegas, Nevada, USA, December 08-12 2003.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
29
-
-
11844251193
-
Active affective state detection and user assistance with dynamic Bayesian networks
-
X. Li and Q. Ji. Active affective state detection and user assistance with dynamic Bayesian networks. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 35(1):93-105, 2005.
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans
, vol.35
, Issue.1
, pp. 93-105
-
-
Li, X.1
Ji, Q.2
-
31
-
-
0036874999
-
Dynamic Bayesian networks for audio-visual speech recognition
-
A. V. Nefian, L. Liang, X. Pi, and K. Murphy. Dynamic Bayesian networks for audio-visual speech recognition. EURASIP Journal on Applied Signal Processing, 11:1-15, 2002.
-
(2002)
EURASIP Journal on Applied Signal Processing
, vol.11
, pp. 1-15
-
-
Nefian, A.V.1
Liang, L.2
Pi, X.3
Murphy, K.4
-
33
-
-
0028546145
-
Dynamic belief networks for discrete monitoring
-
1593-1610
-
A. E. Nicholson and J. M. Brady. Dynamic belief networks for discrete monitoring. IEEE Transactions on Systems, Man, and Cybernetics, special issue on Knowledge-Based Construction of Probabilistic and Decision Models, 24(11):1593-1610, 1994.
-
(1994)
IEEE Transactions on Systems, Man, and Cybernetics, special issue on Knowledge-Based Construction of Probabilistic and Decision Models
, vol.24
, Issue.11
-
-
Nicholson, A.E.1
Brady, J.M.2
-
35
-
-
34547306128
-
Privacy issues: Business impacts and responsibilities
-
Technical report, CAAA/SAP AG Technology and Accounting Education Seminar Series, Canadian Academic Accounting Association CAAA
-
R. G. Parker. Privacy issues: Business impacts and responsibilities. Technical report, CAAA/SAP AG Technology and Accounting Education Seminar Series, Canadian Academic Accounting Association (CAAA), 2005.
-
(2005)
-
-
Parker, R.G.1
-
37
-
-
0027208502
-
Detection and elimination of inference channels in multilevel relational database systems
-
Oakland, CA, May 24-26
-
X. Qian, M. Stickel, P. Karp, T. Lunt, and T. Garvey. Detection and elimination of inference channels in multilevel relational database systems. In Proceedings of the 1993 IEEE Symposium on Security and Privacy, pages 110-116, Oakland, CA, May 24-26 1993.
-
(1993)
Proceedings of the 1993 IEEE Symposium on Security and Privacy
, pp. 110-116
-
-
Qian, X.1
Stickel, M.2
Karp, P.3
Lunt, T.4
Garvey, T.5
-
38
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
February
-
L. R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of IEEE, 77(2):257-286, February 1989.
-
(1989)
Proceedings of IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
39
-
-
33750740466
-
Dynamic Bayesian networks for classification of rail defects
-
Budapest, Hungary, August 26-28
-
A. B. Salem, L. Bouillaut, P. Aknin, and P. Weber. Dynamic Bayesian networks for classification of rail defects. In Proceedings of the Fourth International Conference on Intelligent Systems Design and Applications (ISDA '04), Budapest, Hungary, August 26-28 2004.
-
(2004)
Proceedings of the Fourth International Conference on Intelligent Systems Design and Applications (ISDA '04)
-
-
Salem, A.B.1
Bouillaut, L.2
Aknin, P.3
Weber, P.4
-
41
-
-
70450137677
-
Annual report of privacy commissioner 2003-2004
-
Technical report, Office of the Privacy Commissioner, New Zealand
-
M. Shroff. Annual report of privacy commissioner 2003-2004. Technical report, Office of the Privacy Commissioner, New Zealand, 2004.
-
(2004)
-
-
Shroff, M.1
-
42
-
-
0031568356
-
Probabilistic independence networks for hidden Markov probability models
-
P. Smyth, D. Heckerman, and M. Jordan. Probabilistic independence networks for hidden Markov probability models. Neural Computation, 9(2):227-269, 1997.
-
(1997)
Neural Computation
, vol.9
, Issue.2
, pp. 227-269
-
-
Smyth, P.1
Heckerman, D.2
Jordan, M.3
-
43
-
-
77952378135
-
Dynamic inference control
-
M. J. Zaki and C. C. Aggarwal, editors, San Diego, CA, June 13, ACM Press
-
J. Staddon. Dynamic inference control. In M. J. Zaki and C. C. Aggarwal, editors, Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'03), pages 94-100, San Diego, CA, June 13 2003. ACM Press.
-
(2003)
Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'03)
, pp. 94-100
-
-
Staddon, J.1
-
44
-
-
0034506382
-
Exploring dynamic bayesian belief networks for intelligent fault management systems
-
Man and Cybernetics, September
-
R. Sterritt, A. Marshall, C. Shapcott, and S. McClean. Exploring dynamic bayesian belief networks for intelligent fault management systems. In Proceedings of IEEE International Conference on Systems, Man and Cybernetics, pages 3646-3652, September 2000.
-
(2000)
Proceedings of IEEE International Conference on Systems
, pp. 3646-3652
-
-
Sterritt, R.1
Marshall, A.2
Shapcott, C.3
McClean, S.4
-
45
-
-
34250773815
-
PIDS: A privacy intrusion detection system
-
S. M. Furnell and P. S. Dowland, editors, Plymouth, UK, July
-
H. S. Venter, M. S. Olivier, and J. H. P. Eloff. PIDS: A privacy intrusion detection system. In S. M. Furnell and P. S. Dowland, editors, Proceedings of the 4th International Network Conference, pages 255-262, Plymouth, UK, July 2004.
-
(2004)
Proceedings of the 4th International Network Conference
, pp. 255-262
-
-
Venter, H.S.1
Olivier, M.S.2
Eloff, J.H.P.3
-
47
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Berkeley, CA, May 9-12
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In Proceedings of 1999 IEEE Symposium on Security & Privacy, pages 133-145, Berkeley, CA, May 9-12 1999.
-
(1999)
Proceedings of 1999 IEEE Symposium on Security & Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
49
-
-
20444441611
-
HMM profiles for network traffic classification
-
Washington, DC, USA, October 29
-
C. Wright, F. Monrose, and G. M. Masson. HMM profiles for network traffic classification. In Proceedings of the Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC'04), pages 9-15, Washington, DC, USA, October 29 2004.
-
(2004)
Proceedings of the Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC'04)
, pp. 9-15
-
-
Wright, C.1
Monrose, F.2
Masson, G.M.3
-
51
-
-
0031624532
-
Speech recognition with dynamic Bayesian networks
-
Madison, WI, USA, AAAI Press
-
G. Zweig and S. Russell. Speech recognition with dynamic Bayesian networks. In Proceedings of the 15th National Conference on Artificial Intelligence (AAAI-1998), pages 173-180, Madison, WI, USA, 1998. AAAI Press.
-
(1998)
Proceedings of the 15th National Conference on Artificial Intelligence (AAAI-1998)
, pp. 173-180
-
-
Zweig, G.1
Russell, S.2
|