-
1
-
-
84868060576
-
Military gaffe results in classified data leak
-
6 May
-
D. Shea, "Military Gaffe Results in Classified Data Leak," Planet PDF, 6 May 2005; www.planetpdf.com/ enterprise/article.asp?ContentID= 7049.
-
(2005)
Planet PDF
-
-
Shea, D.1
-
2
-
-
84868055754
-
A new generation of redacting tools
-
14 Nov.
-
A. Kaplan, "A New Generation of Redacting Tools," Nat'l Law J., 14 Nov. 2002; www.law.com/jsp/article. jsp?id=1036630382605.
-
(2002)
Nat'l Law J.
-
-
Kaplan, A.1
-
3
-
-
75149118040
-
Overlay mechanisms for multi-level deep processing applications
-
CSLI Publications
-
T.H. King and J.T. Maxwell III, "Overlay Mechanisms for Multi-Level Deep Processing Applications," Proc. Grammar Eng. across Frameworks, CSLI Publications, 2007, pp. 182-202.
-
(2007)
Proc. Grammar Eng. Across Frameworks
, pp. 182-202
-
-
King, T.H.1
Maxwell III, J.T.2
-
5
-
-
38749142809
-
Revisiting the uniqueness of simple demographics in the US population
-
ACM Press
-
P. Golle, "Revisiting the Uniqueness of Simple Demographics in the US Population," Workshop on Privacy in the Electronic Society, ACM Press, 2006; http://crypto. stanford.edu/∼pgolle/papers/census.pdf.
-
(2006)
Workshop on Privacy in the Electronic Society
-
-
Golle, P.1
-
6
-
-
0027208502
-
Detection and elimination of inference channels in multilevel relational database systems
-
IEEE CS Press
-
X. Qian et al., "Detection and Elimination of Inference Channels in Multilevel Relational Database Systems," IEEE Symp. Security and Privacy, IEEE CS Press, 1993, p. 196.
-
(1993)
IEEE Symp. Security and Privacy
, pp. 196
-
-
Qian, X.1
-
7
-
-
32944455392
-
AI technologies to defeat identity theft vulnerabilities
-
AAAI
-
L. Sweeney, "AI Technologies to Defeat Identity Theft Vulnerabilities," AAAI Spring Symp. AI Technologies for Homeland Security, AAAI, 2005; http://privacy.cs.cmu. edu/dataprivacy/papers/LIDAP-WP12.pdf.
-
(2005)
AAAI Spring Symp. AI Technologies for Homeland Security
-
-
Sweeney, L.1
-
8
-
-
84872236868
-
Web-based inference detection
-
ACM Press
-
J. Staddon, P. Golle, and B. Zimny, "Web-Based Inference Detection," Proc. Usenix Security 2007, ACM Press, 2007; www2.parc.com/csl/members/jstaddon/ publications/USENIX07Full.pdf.
-
(2007)
Proc. Usenix Security 2007
-
-
Staddon, J.1
Golle, P.2
Zimny, B.3
-
9
-
-
65449137151
-
Detecting privacy leaks using corpus-based association rules
-
(ACM KDD), ACM Press
-
R. Chow, P. Golle, and J. Staddon, "Detecting Privacy Leaks Using Corpus-Based Association Rules," Proc. Int'l Conf. Knowledge Discovery and Data Mining (ACM KDD), ACM Press, 2008; www.parc.com/content/ attachments/detecting-privacy-leaks-6615-parc.pdf.
-
(2008)
Proc. Int'l Conf. Knowledge Discovery and Data Mining
-
-
Chow, R.1
Golle, P.2
Staddon, J.3
-
10
-
-
4944239578
-
A document corpus browser for in- depth reading
-
ACM Press
-
E. Bier et al., "A Document Corpus Browser for In- Depth Reading," Proc. Joint Conf. Digital Libraries ( JCDL 04), ACM Press, 2004, pp. 87-96.
-
(2004)
Proc. Joint Conf. Digital Libraries ( JCDL 04)
, pp. 87-96
-
-
Bier, E.1
-
11
-
-
84869107549
-
Entity quick click: Rapid text copying based on automatic entity extraction
-
E. Bier, E. Ishak, and E. Chi, "Entity Quick Click: Rapid Text Copying Based on Automatic Entity Extraction," Proc. Conf. Human Factors in Computing Systems (CHI 06), 2006; www.parc.com/content/attachments/ entity-quick-click-5678-parc.pdf.
-
(2006)
Proc. Conf. Human Factors in Computing Systems (CHI 06)
-
-
Bier, E.1
Ishak, E.2
Chi, E.3
-
12
-
-
33745898218
-
Entity workspace: An evidence file that aids memory, inference, and reading
-
IEEE CS Press
-
E. Bier, E. Ishak, and E.H. Chi, "Entity Workspace: An Evidence File that Aids Memory, Inference, and Reading," Proc. Int'l Conf. Intelligence and Security Informatics (ISI 06), IEEE CS Press, 2006, pp. 466-472.
-
(2006)
Proc. Int'l Conf. Intelligence and Security Informatics (ISI 06)
, pp. 466-472
-
-
Bier, E.1
Ishak, E.2
Chi, E.H.3
-
13
-
-
84868074315
-
A content-driven access control system
-
ACM Press
-
J. Staddon et al., "A Content-Driven Access Control System," IDTrust 2008, ACM Press, 2008; www.parc. com/content/attachments/content-driven- access-control-6356-parc.pdf.
-
(2008)
IDTrust 2008
-
-
Staddon, J.1
-
14
-
-
84868066908
-
Illuminating blacked-out words
-
10 May
-
J. Markoff, "Illuminating Blacked-Out Words, The New York Times, 10 May 2004; www.nytimes.com/ 2004/05/10/technology/10crypto.html.
-
(2004)
The New York Times
-
-
Markoff, J.1
|