-
1
-
-
77951201056
-
Privacypreserving data publishing: A survey on recent developments
-
December
-
B. Fung, K. Wang, R. Chen, and P. Yu, "Privacypreserving data publishing: A survey on recent developments," in ACM Computing Surveys, Vol. 42, Issue No 4, December 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
2
-
-
14944378854
-
The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in videosensor networks
-
D. A. Fidaleo, H.-A. Nguyen, and M. Trivedi, "The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in videosensor networks," in The 2nd ACM International Workshop on Video Surveillance & Sensor Networks, 2004, pp. 46-53.
-
(2004)
The 2nd ACM International Workshop on Video Surveillance & Sensor Networks
, pp. 46-53
-
-
Fidaleo, D.A.1
Nguyen, H.-A.2
Trivedi, M.3
-
3
-
-
70350395089
-
Dynamic privacy assessment in a smart house environment using multimodal sensing
-
S. Moncrieff, S. Venkatesh, and G. West, "Dynamic privacy assessment in a smart house environment using multimodal sensing," ACM Trans. Multimedia Comput. Commun. Appl., vol. 5, no. 2, pp. 1-29, 2008.
-
(2008)
ACM Trans. Multimedia Comput. Commun. Appl.
, vol.5
, Issue.2
, pp. 1-29
-
-
Moncrieff, S.1
Venkatesh, S.2
West, G.3
-
4
-
-
54049150459
-
Compression independent object encryption for ensuring privacy in video surveillance
-
P. Carrillo, H. Kalva, and S. Magliveras, "Compression independent object encryption for ensuring privacy in video surveillance," in IEEE International Conference on Multimedia and Expo, 2008, pp. 273-276.
-
(2008)
IEEE International Conference on Multimedia and Expo
, pp. 273-276
-
-
Carrillo, P.1
Kalva, H.2
Magliveras, S.3
-
5
-
-
33748052046
-
Access control, confidentiality and privacy for video surveillance databases
-
B. Thuraisingham, G. Lavee, E. Bertino, J. Fan, and L. Khan, "Access control, confidentiality and privacy for video surveillance databases," in The 11th ACM Symposium on Access Control Models and Technologies, 2006, pp. 1-10.
-
(2006)
The 11th ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Thuraisingham, B.1
Lavee, G.2
Bertino, E.3
Fan, J.4
Khan, L.5
-
6
-
-
13444271747
-
Privacy protecting data collection in media spaces
-
J.Wickramasuriya, M. Datt, S. Mehrotra, and N. Venkatasubramanian, "Privacy protecting data collection in media spaces," in The 12th ACM International Conference on Multimedia, 2004, pp. 48-55.
-
(2004)
The 12th ACM International Conference on Multimedia
, pp. 48-55
-
-
Wickramasuriya, J.1
Datt, M.2
Mehrotra, S.3
Venkatasubramanian, N.4
-
7
-
-
33847646333
-
Toward a common event model for multimedia applications
-
U. Westermann and R. Jain, "Toward a common event model for multimedia applications," IEEE MultiMedia, vol. 14, no. 1, pp. 19-29, 2007.
-
(2007)
IEEE MultiMedia
, vol.14
, Issue.1
, pp. 19-29
-
-
Westermann, U.1
Jain, R.2
-
8
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
9
-
-
34248181923
-
L-diversity: Privacy beyond kanonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond kanonymity," ACM Trans. Knowl. Discov. Data, vol. 1, no. 1, pp. 3, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
|