-
2
-
-
84885686424
-
-
http://tracehotnews.com/sony-admitted-psns-70-million-usersinformation- leakage, 2013.
-
(2013)
-
-
-
3
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
J. Al-Muhtadi, R.H. Campbell, A. Kapadia, M.D. Mickunas, and S. Yi, "Routing through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments," Proc. 22nd Int'l Conf. Distributing Computer Systems, pp. 74-83, 2002. (Pubitemid 34980654)
-
(2002)
Proceedings - International Conference on Distributed Computing Systems
, pp. 74-83
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, M.D.4
Yi, S.5
-
4
-
-
0037619265
-
Web search for a planet: The google cluster architecture
-
Mar./Apr
-
L.A. Barroso, J. Dean, and U. Hö lzle, "Web Search for a Planet: The Google Cluster Architecture," IEEE Micro, vol. 23, no. 2, pp. 22-28, Mar./Apr. 2003.
-
(2003)
IEEE Micro
, vol.23
, Issue.2
, pp. 22-28
-
-
Barroso, L.A.1
Dean, J.2
Hölzle, U.3
-
6
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
DOI 10.1145/380749.380767
-
A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, "Design and Evaluation of a Wide-Area Event Notification Service," ACM Trans. Computer Systems, vol. 19, no. 3, pp. 332-383, 2001. (Pubitemid 33619857)
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
7
-
-
1242332561
-
Forwarding in a content-based network
-
Aug
-
A. Carzaniga and A.L. Wolf, "Forwarding in a Content-Based Network," Proc. ACM SIGCOMM '03, pp. 163-174, Aug. 2003.
-
(2003)
Proc. ACM SIGCOMM '03
, pp. 163-174
-
-
Carzaniga, A.1
Wolf, A.L.2
-
8
-
-
78049360046
-
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
-
S. Choi, G. Ghinita, and E. Bertino, "A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations," Proc. Int'l Conf. Database Expert Applications (DEXA), pp. 368-384, 2010.
-
(2010)
Proc. Int'l Conf. Database Expert Applications (DEXA)
, pp. 368-384
-
-
Choi, S.1
Ghinita, G.2
Bertino, E.3
-
9
-
-
34547474184
-
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
-
DOI 10.1145/1183471.1183500, Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, ACM-GIS'06
-
C.-Y. Chow, M.F. Mokbel, and X. Liu, "A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-Based Service," Proc. 14th Ann. ACM Int'l Symp. Advances in Geographic Information Systems (GIS), pp. 171-178, 2006. (Pubitemid 47168545)
-
(2006)
GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems
, pp. 171-178
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
10
-
-
77954724421
-
Load-balanced query dissemination in privacy-aware online communities
-
E. Curtmola, A. Deutsch, K.K. Ramakrishnan, and D. Srivastava, "Load-Balanced Query Dissemination in Privacy-Aware Online Communities," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 471-482, 2010.
-
Proc. ACM SIGMOD Int'l Conf. Management of Data
, vol.2010
, pp. 471-482
-
-
Curtmola, E.1
Deutsch, A.2
Ramakrishnan, K.K.3
Srivastava, D.4
-
11
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, "Differential Privacy," Proc. Int'l Colloquium Automata, Languages and Programming (ICALP), pp. 1-12, 2006. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4052
, pp. 1-12
-
-
Dwork, C.1
-
12
-
-
0034826382
-
Filtering algorithms and implementation for very fast publish/subscribe
-
F. Fabret, H.-A. Jacobsen, F. Llirbat, J. Pereira, K.A. Ross, and D. Shasha, "Filtering Algorithms and Implementation for Very Fast Publish/Subscribe," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 115-126, 2001.
-
(2001)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 115-126
-
-
Fabret, F.1
Jacobsen, H.-A.2
Llirbat, F.3
Pereira, J.4
Ross, K.A.5
Shasha, D.6
-
13
-
-
0034826382
-
Filtering algorithms and implementation for very fast publish/subscribe
-
F. Fabret, H.-A. Jacobsen, F. Llirbat, J. Pereira, K.A. Ross, and D. Shasha, "Filtering Algorithms and Implementation for Very Fast Publish/Subscribe," Proc. SIGMOD Int'l Conf. Management of Data, pp. 115-126, 2001.
-
(2001)
Proc. SIGMOD Int'l Conf. Management of Data
, pp. 115-126
-
-
Fabret, F.1
Jacobsen, H.-A.2
Llirbat, F.3
Pereira, J.4
Ross, K.A.5
Shasha, D.6
-
14
-
-
82155187148
-
Small cache, big effect: Provable load balancing for randomly partitioned cluster services
-
B. Fan, H. Lim, D.G. Andersen, and M. Kaminsky, "Small Cache, Big Effect: Provable Load Balancing for Randomly Partitioned Cluster Services," Proc. ACM Symp. Cloud Computing (SOCC), pp. 1-13, 2011.
-
(2011)
Proc. ACM Symp. Cloud Computing (SOCC)
, pp. 1-13
-
-
Fan, B.1
Lim, H.2
Andersen, D.G.3
Kaminsky, M.4
-
15
-
-
78349262713
-
SPADS: Publisher anonymization for dht storage
-
P. Felber, M. Rajman, E. Riviere, V. Schiavoni, and J. Valerio, "SPADS: Publisher Anonymization for dht Storage," Proc. IEEE 10th Int'l Conf. Peer to Per Computing (P2P), pp. 1-10, 2010.
-
(2010)
Proc. IEEE 10th Int'l Conf. Peer to per Computing (P2P)
, pp. 1-10
-
-
Felber, P.1
Rajman, M.2
Riviere, E.3
Schiavoni, V.4
Valerio, J.5
-
17
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
DOI 10.1109/TMC.2007.1062
-
B. Gedik and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms," IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008. (Pubitemid 350183929)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
20
-
-
80054706692
-
Optimized cluster-based filtering algorithm for graph metadata
-
H. Liu, Z. Wu, M. Petrovic, and H.-A. Jacobsen, "Optimized Cluster-Based Filtering Algorithm for Graph Metadata," Information Sciences, vol. 181, no. 24, pp. 5468-5484, 2011.
-
(2011)
Information Sciences
, vol.181
, Issue.24
, pp. 5468-5484
-
-
Liu, H.1
Wu, Z.2
Petrovic, M.3
Jacobsen, H.-A.4
-
21
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-Diversity: Privacy Beyond K-Anonymity," Proc. Int'l Conf. Data Eng. (ICDE), p. 24, 2006.
-
(2006)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 24
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
23
-
-
81155153612
-
-
technical report, Purdue Univ June
-
M. Nabeel, N. Shang, and E. Bertino, "Privacy-Preserving Filtering and Covering in Content-Based Publish Subscribe Systems," technical report, Purdue Univ., June 2009.
-
(2009)
Privacy-Preserving Filtering and Covering in Content-Based Publish Subscribe Systems
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
24
-
-
84864055603
-
Efficient privacy preserving content based publish subscribe systems
-
M. Nabeel, N. Shang, and E. Bertino, "Efficient Privacy Preserving Content Based Publish Subscribe Systems," Proc. 17th ACM Symp. Access Control Models and Technologies (SACMAT), pp. 133-144, 2012.
-
(2012)
Proc. 17th ACM Symp. Access Control Models and Technologies (S ACMAT)
, pp. 133-144
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
25
-
-
38349046363
-
Supporting privacy policies in a publish-subscribe substrate for pervasive environments
-
L. Opyrchal, A. Prakash, and A. Agrawal, "Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments," J. Networks, vol. 2, no. 1, pp. 17-26, 2007.
-
(2007)
J. Networks
, vol.2
, Issue.1
, pp. 17-26
-
-
Opyrchal, L.1
Prakash, A.2
Agrawal, A.3
-
26
-
-
49149123423
-
Composition and generalization of context data for privacy preservation
-
L. Pareschi, D. Riboni, A. Agostini, and C. Bettini, "Composition and Generalization of Context Data for Privacy Preservation," Proc. IEEE Sixth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 429-433, 2008.
-
(2008)
Proc. IEEE Sixth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom)
, pp. 429-433
-
-
Pareschi, L.1
Riboni, D.2
Agostini, A.3
Bettini, C.4
-
27
-
-
78049392713
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
C. Raiciu and D.S. Rosenblum, "Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures," Proc. Secure-Comm Workshops, pp. 1-11, 2006.
-
(2006)
Proc. Secure-Comm Workshops
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
28
-
-
70349694026
-
On efficient content matching in distributed pub/sub systems
-
W. Rao, L. Chen, and A.W. Fu, "On Efficient Content Matching in Distributed Pub/Sub Systems," Proc. IEEE INFOCOM, 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Rao, W.1
Chen, L.2
Fu, A.W.3
-
29
-
-
81155135063
-
Stairs: Towards efficient full-text filtering and dissemination in DHT environments
-
W. Rao, L. Chen, and A.W.-C. Fu, "Stairs: Towards Efficient Full-Text Filtering and Dissemination in DHT Environments," VLDB J., vol. 20, no. 6, pp. 793-817, 2011.
-
(2011)
VLDB J
, vol.20
, Issue.6
, pp. 793-817
-
-
Rao, W.1
Chen, L.2
Fu, A.W.-C.3
-
30
-
-
84866952729
-
Move: A large scale keyword-based content filtering and dissemination system
-
W. Rao, L. Chen, P. Hui, and S. Tarkoma, "Move: A Large Scale Keyword-Based Content Filtering and Dissemination System," Proc. IEEE 32nd Int'l Conf. Distributed Computing Systems (ICDCS), 2012.
-
(2012)
Proc. IEEE 32nd Int'l Conf. Distributed Computing Systems (ICDCS)
-
-
Rao, W.1
Chen, L.2
Hui, P.3
Tarkoma, S.4
-
31
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001. (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
32
-
-
77952783550
-
A privacy-preserving approach to policy-based content dissemination
-
N. Shang, M. Nabeel, F. Paci, and E. Bertino, "A Privacy-Preserving Approach to Policy-Based Content Dissemination," Proc. IEEE 26th Int'l Conf. Data Eng. (ICDE), pp. 944-955, 2010.
-
(2010)
Proc. IEEE 26th Int'l Conf. Data Eng. (ICDE)
, pp. 944-955
-
-
Shang, N.1
Nabeel, M.2
Paci, F.3
Bertino, E.4
-
33
-
-
84885059952
-
Privacy-preserving content-based publish/subscribe networks
-
A. Shikfa, M. O ̈ nen, and R. Molva, "Privacy-Preserving Content-Based Publish/Subscribe Networks," Proc. 24th Int'l Information Security Conf. (SEC), pp. 270-282, 2009.
-
(2009)
Proc. 24th Int'l Information Security Conf. (SEC)
, pp. 270-282
-
-
Shikfa, A.1
Önen, M.2
Molva, R.3
-
35
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
36
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
M. Terrovitis, N. Mamoulis, and P. Kalnis, "Privacy-Preserving Anonymization of Set-Valued Data," Proc. VLDB Endowment, vol. 1, no. 1, pp. 115-125, 2008.
-
(2008)
Proc. VLDB Endowment
, vol.1
, Issue.1
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
38
-
-
77953980631
-
Privacy-aware mobile services over road networks
-
T. Wang and L. Liu, "Privacy-Aware Mobile Services over Road Networks," Proc. VLDB Endowment, vol. 2, no. 1, pp. 1042-1053, 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, Issue.1
, pp. 1042-1053
-
-
Wang, T.1
Liu, L.2
|