Export 14 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is privacy  [Clear All Filters]
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
Aggarwal G, Panigrahy R, Feder T, Thomas D, Kenthapadi K, Khuller S, Zhu A.  2010.  Achieving anonymity via clustering. ACM Trans. Algorithms. 6(3):49:1–49:19-49:1–49:19.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Chow R, Golle P, Jakobsson M, Elaine Shi, Staddon J, Masuoka R, Molina J.  2009.  Controlling data in the cloud: outsourcing computation without outsourcing control. :85-90.
Baden R, Bender A, Spring N, Bhattacharjee B, Starin D.  2009.  Persona: an online social network with user-defined privacy. Proceedings of the ACM SIGCOMM 2009 conference on Data communication. :135-146.
Zheleva E, Getoor L.  2009.  To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. Proceedings of the 18th international conference on World wide web. :531-540.
Zheleva E, Getoor L.  2008.  Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
Aggarwal G, Feder T, Kenthapadi K, Khuller S, Panigrahy R, Thomas D, Zhu A.  2006.  Achieving anonymity via clustering. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :153-162.
Plaisant C, Clamage A, Hutchinson H B, Bederson BB, Druin A.  2006.  Shared family calendars: Promoting symmetry and accessibility. ACM Trans. Comput.-Hum. Interact.. 13(3):313-346.
Ceaparu I, Shneiderman B.  2002.  Improving Web-based civic information access: a case study of the 50 US states. 2002 International Symposium on Technology and Society, 2002. (ISTAS'02). :275-282.
Scholtz J, Johnson J, Shneiderman B, Hope-Tindall P, Gosling M, Phillips J, Wexelblat A.  2002.  Interacting with identification technology: can it make us more secure? CHI '02 extended abstracts on Human factors in computing systems. :564-565.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Friedman B, Thomas JC, Grudin J, Nass C, Nissenbaum H, Schlager M, Shneiderman B.  1999.  Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.