-
1
-
-
74049086652
-
-
HIPAA
-
HIPAA, http://www.dhhs.gov/ocr/hipaa
-
-
-
-
2
-
-
74049129044
-
-
Adam Meyerson and Ryan Williams. On the Complexity of Optimal k-Anonymity. PODS, 2004.
-
Adam Meyerson and Ryan Williams. On the Complexity of Optimal k-Anonymity. PODS, 2004.
-
-
-
-
3
-
-
74049096894
-
-
Broder, A. 2002. A taxonomy of web search. SIGIR Forum 36, 2 (Sep. 2002), 3-10. DOI=http://doi.acm.org/10.1145/792550.792552Cooper, A.
-
Broder, A. 2002. A taxonomy of web search. SIGIR Forum 36, 2 (Sep. 2002), 3-10. DOI=http://doi.acm.org/10.1145/792550.792552Cooper, A.
-
-
-
-
4
-
-
55149118992
-
A Survey of Query Log Privacy-Enhancing Techniques from a Policy Perspective
-
TWEB, issue, Oct
-
"A Survey of Query Log Privacy-Enhancing Techniques from a Policy Perspective," ACM Transactions on the Web (TWEB), vol. 2, issue 4, Oct. 2008
-
(2008)
ACM Transactions on the Web
, vol.2
, Issue.4
-
-
-
5
-
-
33746335051
-
-
C. Dwork. Differential privacy. In M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, ICALP (2), 4052 of Lecture Notes in Computer Science, pages 1-12. Springer, 2006.
-
C. Dwork. "Differential privacy". In M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, ICALP (2), volume 4052 of Lecture Notes in Computer Science, pages 1-12. Springer, 2006.
-
-
-
-
6
-
-
84863602208
-
-
Protégé, http://protege.stanford.edu/
-
Protégé
-
-
-
7
-
-
74049120967
-
-
Microsoft Beyond Search RFP
-
Microsoft Beyond Search RFP, http://research.microsoft.com/ur/us/ fundingopps/RFPs/BeyondSearch-RFP.aspx
-
-
-
-
8
-
-
50249086141
-
-
Differential Privacy, http://www.cs.cmu.edu/~CompThink/mindswaps/oct07/ difpriv.ppt
-
Differential Privacy
-
-
-
10
-
-
74049131340
-
-
is exposed for AOL Searcher No. 4417749
-
A Face is exposed for AOL Searcher No. 4417749, http://www.nytimes.com/ 2006/08/09/technology/09aol.html?ex=1312776000
-
A Face
-
-
-
13
-
-
0001685668
-
-
Jansen, B. J., Spink, A., Bateman, J., and Saracevic, T. 1998. Real life information retrieval: a study of user queries on the Web. SIGIR Forum 32, 1 (Apr. 1998), 5-17. DOI=http://doi.acm.org/10.1145/281250.281253
-
Jansen, B. J., Spink, A., Bateman, J., and Saracevic, T. 1998. Real life information retrieval: a study of user queries on the Web. SIGIR Forum 32, 1 (Apr. 1998), 5-17. DOI=http://doi.acm.org/10.1145/281250.281253
-
-
-
-
14
-
-
35348838459
-
-
Kumar, R., Novak, J., Pang, B., and Tomkins, A. 2007. On anonym zing query logs via token-based hashing. In Proceedings of the 16th international Conference on World Wide Web (Banff, Alberta, Canada, May 08 - 12, 2007). WWW '07. ACM, New York, NY, 629-638. DOI=http://doi.acm.org/10.1145/1242572.1242657
-
Kumar, R., Novak, J., Pang, B., and Tomkins, A. 2007. On anonym zing query logs via token-based hashing. In Proceedings of the 16th international Conference on World Wide Web (Banff, Alberta, Canada, May 08 - 12, 2007). WWW '07. ACM, New York, NY, 629-638. DOI=http://doi.acm.org/10.1145/1242572.1242657
-
-
-
-
15
-
-
74049143298
-
Towards Privacy preserving Query Log Publishing
-
LiXiong, Eugene Agichtein. "Towards Privacy preserving Query Log Publishing". In proceedings of WWW 2007.
-
(2007)
proceedings of WWW
-
-
LiXiong, E.A.1
-
17
-
-
19944362539
-
-
Rose, D. E. and Levinson, D. 2004. Understanding user goals in web search. In Proceedings of the 13th international Conference on World Wide Web (New York, NY, USA, May 17 - 20, 2004). WWW '04. ACM, New York, NY, 13-19. DOI= http://doi.acm.org/10.1145/988672.988675
-
Rose, D. E. and Levinson, D. 2004. Understanding user goals in web search. In Proceedings of the 13th international Conference on World Wide Web (New York, NY, USA, May 17 - 20, 2004). WWW '04. ACM, New York, NY, 13-19. DOI= http://doi.acm.org/10.1145/988672.988675
-
-
-
-
18
-
-
3042687811
-
-
Silverstein, C., Marais, H., Henzinger, M., and Moricz, M. 1999. Analysis of a very large web search engine query log. SIGIR Forum 33, 1 (Sep. 1999), 6-12. DOI=http://doi.acm.org/10.1145/331403.331405
-
Silverstein, C., Marais, H., Henzinger, M., and Moricz, M. 1999. Analysis of a very large web search engine query log. SIGIR Forum 33, 1 (Sep. 1999), 6-12. DOI=http://doi.acm.org/10.1145/331403.331405
-
-
-
-
19
-
-
33847027721
-
-
Slagell, A.; Yurcik, W., Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymisation, Security and Privacy for Emerging Areas in Communication Networks, 2005. Workshop of the 1st International Conference on , no., pp. 80-89, 5-9 Sept. 2005
-
Slagell, A.; Yurcik, W., "Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymisation," Security and Privacy for Emerging Areas in Communication Networks, 2005. Workshop of the 1st International Conference on , vol., no., pp. 80-89, 5-9 Sept. 2005
-
-
-
-
20
-
-
0036567931
-
A user-centered approach to evaluating human interaction with web search engines: An exploratory study
-
DOI= http://dx.doi.org/10.1016/S0306-4573(01)00036-X, May
-
Spink, A. 2002. A user-centered approach to evaluating human interaction with web search engines: an exploratory study. Inf. Process. Manage. 38, 3 (May. 2002), 401-426. DOI= http://dx.doi.org/10.1016/S0306-4573(01)00036-X
-
(2002)
Inf. Process. Manage
, vol.38
, Issue.3
, pp. 401-426
-
-
Spink, A.1
-
21
-
-
0036643004
-
Characteristics of question format web queries: An exploratory study
-
DOI=http://dx.doi.org/10.1016/S0306-4573(01)00042-5, Jul
-
Spink, A. and Ozmultu, H. C. 2002. Characteristics of question format web queries: an exploratory study. Inf. Process. Manage. 38, 4 (Jul. 2002), 453-471. DOI=http://dx.doi.org/10.1016/S0306-4573(01)00042-5
-
(2002)
Inf. Process. Manage
, vol.38
, Issue.4
, pp. 453-471
-
-
Spink, A.1
Ozmultu, H.C.2
-
22
-
-
0036811662
-
-
Sweeney L. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002: 10 (5), pp. 557-570.
-
Sweeney L. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002: 10 (5), pp. 557-570.
-
-
-
-
23
-
-
1242310066
-
A high-level programming environment for packet trace anonymisation and transformation
-
Pang, R. and Paxson, V. 2003. A high-level programming environment for packet trace anonymisation and transformation. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Karlsruhe, Germany, August 25-29, 2003). SIGCOMM '03. ACM, New York, NY, 339-351. DOI= http://doi.acm.org/10.1145/863955.863994
-
(2003)
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Karlsruhe, Germany, August 25-29, 2003). SIGCOMM '03. ACM, New York, NY, 339-351. DOI
-
-
Pang, R.1
Paxson, V.2
|