• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,083
Next 10 →

CLIENT PRIVACY AND SOCIAL WORK: A COMPARISON BY AGENCY FUNCTION

by Linda R. Hogan, Mary Ski Hunter, M. Coleen Shannon, Linda R. Hogan, M. Coleen Shannon, Ph. D , 2014
"... This study examines the effect of agency function or pur-pose on the handling of client privacy issues in social work agencies. Practitioners working in public and private agencies were compared. The data revealed that, more than those in pri-vate agencies, social workers in public agencies: (1) tho ..."
Abstract - Add to MetaCart
This study examines the effect of agency function or pur-pose on the handling of client privacy issues in social work agencies. Practitioners working in public and private agencies were compared. The data revealed that, more than those in pri-vate agencies, social workers in public agencies: (1

GroupLens: An Open Architecture for Collaborative Filtering of Netnews

by Paul Resnick, Neophytos Iacovou, Mitesh Suchak, Peter Bergstrom, John Riedl , 1994
"... Collaborative filters help people make choices based on the opinions of other people. GroupLens is a system for collaborative filtering of netnews, to help people find articles they will like in the huge stream of available articles. News reader clients display predicted scores and make it easy for ..."
Abstract - Cited by 1548 (41 self) - Add to MetaCart
Collaborative filters help people make choices based on the opinions of other people. GroupLens is a system for collaborative filtering of netnews, to help people find articles they will like in the huge stream of available articles. News reader clients display predicted scores and make it easy

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
, and instant messaging. Clients choose a path through the network and build a circuit, in which each node (or "onion router" or "OR") in the path knows its predecessor and successor, but no other nodes in the circuit. Traffic flows down the circuit in fixed-size cells, which are unwrapped

Anonymous connections and onion routing

by Michael G. Reed, Paul F. Syverson, David M. Goldschlag - IEEE Journal on Selected Areas in Communications , 1998
"... Abstract—Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing’s anonymous connections are bidirectional, near real-time, and can be used anywhere a s ..."
Abstract - Cited by 368 (18 self) - Add to MetaCart
to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy-aware applications, such as web browsers and e-mail clients, require no modification to use onion routing, and do so through a series of proxies. A prototype onion routing

Privacy

by unknown authors
"... Digital forensics nd h g an comp constantly growing. For mobile users, access to this data leverage the decreasing cost of hard disk storage seen in Storage as a Service (SaaS) providers, e.g., Amazon S3, to provide data storage on the cloud to home users and is also backed up by a full distributed ..."
Abstract - Add to MetaCart
data-centre archi-side the financial data is available usually machine essed on multiple at partitions or es of the same file ropbox, also have offline client applications that allow for synchronisation of data to a local folder for offline access. Each of the aforementioned services can be categorised

Privacy

by unknown authors
"... Today’s enterprise applications are complex, business-critical software systems. An important extra-functional characteristic of these systems is performance, consisting of timing behavior and resource utilization. Especially performance requirements on timing behavior metrics such as throughput or ..."
Abstract - Add to MetaCart
or end-to-end response time are part of the so-called Service Level Agreements (SLAs) the provider and the client of a service agreed on. The SLAs constitute a contractual specification regarding the Quality of Service (QoS) that must be satisfied by the application service provider. Particularly

Engineering privacy

by Sarah Spiekermann, Lorrie Faith Cranor, Senior Member - IEEE Transactions on Software Engineering , 2009
"... Abstract—In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline’s topics. First, we discuss privacy requirements grounded in both historic and contemporary perspectives ..."
Abstract - Cited by 92 (4 self) - Add to MetaCart
and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. This paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design

Privacy and Client-based Discovery of Location

by Jason I. Hong, J. D. Tygar
"... Wireless network hotspots, such as 802.11b WiFi access points, can be used as beacons that provide an inexpensive, large-scale, and privacy-sensitive way of determining one’s current location. This approach, however, requires creating and storing databases of a large number of access point locations ..."
Abstract - Add to MetaCart
Wireless network hotspots, such as 802.11b WiFi access points, can be used as beacons that provide an inexpensive, large-scale, and privacy-sensitive way of determining one’s current location. This approach, however, requires creating and storing databases of a large number of access point

An Architecture for Privacy-preserving Mining of Client Information

by Murat Kantarcioglu, Jaideep Vaidya , 2002
"... Due to privacy concerns, clients of some services may not want to reveal their private information. Even in these situations, data mining is feasible without sacrificing user privacy. Prior approaches to this problem generally trade o# accuracy for security, without giving provable bounds on securit ..."
Abstract - Cited by 27 (6 self) - Add to MetaCart
Due to privacy concerns, clients of some services may not want to reveal their private information. Even in these situations, data mining is feasible without sacrificing user privacy. Prior approaches to this problem generally trade o# accuracy for security, without giving provable bounds

Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

by Rosario Gennaro, Craig Gentry, Bryan Parno , 2009
"... Verifiable Computation enables a computationally weak client to “outsource ” the computation of a function F on various inputs x1,...,xk to one or more workers. The workers return the result of the function evaluation, e.g., yi = F(xi), as well as a proof that the computation of F was carried out co ..."
Abstract - Cited by 221 (13 self) - Add to MetaCart
-length of the output of F. The protocol requires a one-time pre-processing stage by the client which takes O(|C|) time, where C is the smallest Boolean circuit computing F. Our scheme also provides input and output privacy for the client, meaning that the workers do not learn any information about the xi or yi values
Next 10 →
Results 1 - 10 of 1,083
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University