Searched for keywords.author.keyword:"privacy" OR acmdlCCS:"privacy"  [new search]  [edit/save query]  [advanced search]
Searched The ACM Full-Text Collection: 472,798 records   [Expand your search to The ACM Guide to Computing Literature: 2,693,848 records] Help: ACM vs. Guide
17,209 results found
Export Results: bibtexendnoteacmrefcsv

Refine by People
Names show/hide
Institutions show/hide
Authors show/hide
Editors show/hide
Reviewers show/hide
Refine by Publications
Publication Names show/hide
ACM Publications show/hide
All Publications show/hide
Content Formats show/hide
Publishers show/hide
Refine by Conferences
Sponsors show/hide
Events show/hide
Proceeding Series show/hide
Refine by Publication Year
1955
Result 1 – 20 of 17,209
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1 published by ACM
October 2012 CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 47,   Downloads (Overall): 211

Full text available: PDFPDF
The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2012 Workshop, held in conjunction with the ACM CCS conference, is the eleventh in a yearly forum for papers on all the ...
Keywords: privacy
[result highlights]

2 published by ACM
November 2009 CIKM '09: Proceedings of the 18th ACM conference on Information and knowledge management
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 3,   Downloads (12 Months): 29,   Downloads (Overall): 318

Full text available: PDFPDF
User search query logs have proven to be very useful, but have vast potential for misuse. Several incidents have shown that simple removal of identifiers is insufficient to protect the identity of users. Publishing such inadequately anonymized data can cause severe breach of privacy. While significant effort has been expended ...
Keywords: privacy
[result highlights]

3 published by ACM
August 2003 KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Publisher: ACM
Bibliometrics:
Citation Count: 164
Downloads (6 Weeks): 9,   Downloads (12 Months): 141,   Downloads (Overall): 1,736

Full text available: PDFPDF
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key is to obtain valid results, while providing guarantees on the (non)disclosure of data. We present a method for k -means clustering when different sites contain ...
Keywords: privacy
[result highlights]

4 published by ACM
May 2017 SIGMOD '17: Proceedings of the 2017 ACM International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 76,   Downloads (12 Months): 178,   Downloads (Overall): 178

Full text available: PDFPDF
Many modern databases include personal and sensitive correlated data, such as private information on users connected together in a social network, and measurements of physical activity of single subjects across time. However, differential privacy, the current gold standard in data privacy, does not adequately address privacy issues in this kind ...
Keywords: differential privacy, privacy, pufferfish privacy
[result highlights]

5 published by ACM
June 2014 SIGMOD '14: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 18,   Downloads (12 Months): 138,   Downloads (Overall): 524

Full text available: PDFPDF
Privacy definitions provide ways for trading-off the privacy of individuals in a statistical database for the utility of downstream analysis of the data. In this paper, we present Blowfish , a class of privacy definitions inspired by the Pufferfish framework, that provides a rich interface for this trade-off. In particular, ...
Keywords: blowfish privacy, privacy, differential privacy
[result highlights]

6 published by ACM
June 2011 SIGMOD '11: Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Publisher: ACM
Bibliometrics:
Citation Count: 66
Downloads (6 Weeks): 28,   Downloads (12 Months): 235,   Downloads (Overall): 1,376

Full text available: PDFPDF
Differential privacy is a powerful tool for providing privacy-preserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers changes very little with the addition or deletion of any tuple. It is frequently accompanied by popularized claims that it provides privacy without any assumptions about ...
Keywords: differential privacy, privacy
[result highlights]

7 published by ACM
June 2011 SIGMOD '11: Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Publisher: ACM
Bibliometrics:
Citation Count: 31
Downloads (6 Weeks): 8,   Downloads (12 Months): 83,   Downloads (Overall): 696

Full text available: PDFPDF
Prior work in differential privacy has produced techniques for answering aggregate queries over sensitive data in a privacy-preserving way. These techniques achieve privacy by adding noise to the query answers. Their objective is typically to minimize absolute errors while satisfying differential privacy. Thus, query answers are injected with noise whose ...
Keywords: differential privacy, privacy
[result highlights]

8 published by ACM
May 2012 PODS '12: Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI symposium on Principles of Database Systems
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 4,   Downloads (12 Months): 83,   Downloads (Overall): 556

Full text available: PDFPDF
In this paper we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized to the needs of a given application. The goal of Pufferfish is to allow experts in an application domain, who frequently do not ...
Keywords: differential privacy, privacy
[result highlights]

9 published by ACM
January 2014 ACM Transactions on Database Systems (TODS): Volume 39 Issue 1, January 2014
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 12,   Downloads (12 Months): 197,   Downloads (Overall): 886

Full text available: PDFPDF
In this article, we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized to the needs of a given application. The goal of Pufferfish is to allow experts in an application domain, who frequently do not ...
Keywords: Privacy, differential privacy
[result highlights]

10 published by ACM
November 2013 CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 17,   Downloads (12 Months): 165,   Downloads (Overall): 806

Full text available: PDFPDF
We introduce a novel privacy framework that we call Membership Privacy. The framework includes positive membership privacy, which prevents the adversary from significantly increasing its ability to conclude that an entity is in the input dataset, and negative membership privacy, which prevents leaking of non-membership. These notions are parameterized by ...
Keywords: privacy notions, membership privacy, differential privacy
[result highlights]

11 published by ACM
October 2016 WPES '16: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 51,   Downloads (Overall): 51

Full text available: PDFPDF
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation, most of the damage has ...
Keywords: cryptography, privacy, privacy-enhancing technologies
[result highlights]

12 published by ACM
February 2016 SIGCSE '16: Proceedings of the 47th ACM Technical Symposium on Computing Science Education
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 12,   Downloads (12 Months): 91,   Downloads (Overall): 129

Full text available: PDFPDF
A basic understanding of online privacy is essential to being an informed digital citizen, and therefore basic privacy education is becoming ever more necessary. Recently released high school and college computer science curricula acknowledge the significantly increased importance of fundamental knowledge about privacy, but do not yet provide concrete content ...
Keywords: online privacy, privacy curriculum, privacy education
[result highlights]

13 published by ACM
May 2017 SIGMOD '17: Proceedings of the 2017 ACM International Conference on Management of Data
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 87,   Downloads (12 Months): 193,   Downloads (Overall): 193

Full text available: PDFPDF
Differential privacy has emerged as an important standard for privacy preserving computation over databases containing sensitive information about individuals. Research on differential privacy spanning a number of research areas, including theory, security, database, networks, machine learning, and statistics, over the last decade has resulted in a variety of privacy preserving ...
Keywords: differential privacy
[result highlights]

14 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 52,   Downloads (12 Months): 644,   Downloads (Overall): 644

Full text available: PDFPDF
Recommender systems typically require users' history data to provide a list of recommendations and such recommendations usually reside on the cloud/server. However, the release of such private data to the cloud has been shown to put users at risk. It is highly desirable to provide users high-quality personalized services while ...
Keywords: privacy-preserving recommendation, privacy paradox, differential privacy
[result highlights]

15 published by ACM
November 2014 CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 22,   Downloads (Overall): 112

Full text available: PDFPDF
The 13th Workshop on Privacy in the Electronic Society is held on November 3, 2014 in Scottsdale, Arizona, USA in conjunction with the 21st ACM Conference on Computer and Communications Security. The goal of this workshop is to discuss the problems of privacy in global interconnected societies and possible solutions ...
Keywords: privacy protection
[result highlights]

16 published by ACM
November 2016 MoMM '16: Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 14,   Downloads (12 Months): 61,   Downloads (Overall): 61

Full text available: PDFPDF
Location tracking applications which receives frequent updates of a moving object's position, collect numerous moving objects' location data. Public transit agencies can make use of tracking data to optimize traffic control strategies. While improper use of trajectory data could cause individuals' privacy leakage. However, existing privacy-preserving techniques are unable to ...
Keywords: Privacy-preserving, differential privacy, trajectory privacy
[result highlights]

17 published by ACM
November 2008 SPRINGL '08: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 226

Full text available: PdfPdf
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up new vulnerabilities that can be exploited to cause security and privacy breaches. Specifically, location data of individuals that are used by such services must be ...
Keywords: access control, location privacy, privacy
[result highlights]

18 published by ACM
December 1993 Communications of the ACM: Volume 36 Issue 12, Dec. 1993
Publisher: ACM
Bibliometrics:
Citation Count: 30
Downloads (6 Weeks): 3,   Downloads (12 Months): 50,   Downloads (Overall): 2,079

Full text available: PDFPDF
Keywords: information privacy
[result highlights]

19 published by ACM
November 2009 CIKM '09: Proceedings of the 18th ACM conference on Information and knowledge management
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 153

Full text available: PDFPDF
A communication trace is a detailed record of the communication between two entities. Communication traces are vital for research in computer networks and study of network protocols in various domains, but their release is severely constrained by privacy and security concerns. In this paper, we propose a framework in which ...
Keywords: privacy, utility
[result highlights]

20 published by ACM
November 2012 IWGS '12: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on GeoStreaming
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5,   Downloads (12 Months): 40,   Downloads (Overall): 251

Full text available: PDFPDF
Location privacy and security of spatio-temporal data has come under high scrutiny in the past years. This has rekindled enormous research interest. So far, most of the research studies that attempt to address location privacy are based on the k -Anonymity privacy paradigm. In this paper, we propose a novel ...
Keywords: differential privacy, location Privacy, moving object privacy, stream privacy
[result highlights]

Result 1 – 20 of 17,209
Result page: 1 2 3 4 5 6 7 8 9 10 >>



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us
 
Export Formats