Results 1 - 10
of
1,083
CLIENT PRIVACY AND SOCIAL WORK: A COMPARISON BY AGENCY FUNCTION
, 2014
"... This study examines the effect of agency function or pur-pose on the handling of client privacy issues in social work agencies. Practitioners working in public and private agencies were compared. The data revealed that, more than those in pri-vate agencies, social workers in public agencies: (1) tho ..."
Abstract
- Add to MetaCart
This study examines the effect of agency function or pur-pose on the handling of client privacy issues in social work agencies. Practitioners working in public and private agencies were compared. The data revealed that, more than those in pri-vate agencies, social workers in public agencies: (1
GroupLens: An Open Architecture for Collaborative Filtering of Netnews
, 1994
"... Collaborative filters help people make choices based on the opinions of other people. GroupLens is a system for collaborative filtering of netnews, to help people find articles they will like in the huge stream of available articles. News reader clients display predicted scores and make it easy for ..."
Abstract
-
Cited by 1548 (41 self)
- Add to MetaCart
Collaborative filters help people make choices based on the opinions of other people. GroupLens is a system for collaborative filtering of netnews, to help people find articles they will like in the huge stream of available articles. News reader clients display predicted scores and make it easy
Tor: The secondgeneration onion router,”
- in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract
-
Cited by 1229 (33 self)
- Add to MetaCart
, and instant messaging. Clients choose a path through the network and build a circuit, in which each node (or "onion router" or "OR") in the path knows its predecessor and successor, but no other nodes in the circuit. Traffic flows down the circuit in fixed-size cells, which are unwrapped
Anonymous connections and onion routing
- IEEE Journal on Selected Areas in Communications
, 1998
"... Abstract—Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing’s anonymous connections are bidirectional, near real-time, and can be used anywhere a s ..."
Abstract
-
Cited by 368 (18 self)
- Add to MetaCart
to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy-aware applications, such as web browsers and e-mail clients, require no modification to use onion routing, and do so through a series of proxies. A prototype onion routing
Privacy
"... Digital forensics nd h g an comp constantly growing. For mobile users, access to this data leverage the decreasing cost of hard disk storage seen in Storage as a Service (SaaS) providers, e.g., Amazon S3, to provide data storage on the cloud to home users and is also backed up by a full distributed ..."
Abstract
- Add to MetaCart
data-centre archi-side the financial data is available usually machine essed on multiple at partitions or es of the same file ropbox, also have offline client applications that allow for synchronisation of data to a local folder for offline access. Each of the aforementioned services can be categorised
Privacy
"... Today’s enterprise applications are complex, business-critical software systems. An important extra-functional characteristic of these systems is performance, consisting of timing behavior and resource utilization. Especially performance requirements on timing behavior metrics such as throughput or ..."
Abstract
- Add to MetaCart
or end-to-end response time are part of the so-called Service Level Agreements (SLAs) the provider and the client of a service agreed on. The SLAs constitute a contractual specification regarding the Quality of Service (QoS) that must be satisfied by the application service provider. Particularly
Engineering privacy
- IEEE Transactions on Software Engineering
, 2009
"... Abstract—In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline’s topics. First, we discuss privacy requirements grounded in both historic and contemporary perspectives ..."
Abstract
-
Cited by 92 (4 self)
- Add to MetaCart
and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. This paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design
Privacy and Client-based Discovery of Location
"... Wireless network hotspots, such as 802.11b WiFi access points, can be used as beacons that provide an inexpensive, large-scale, and privacy-sensitive way of determining one’s current location. This approach, however, requires creating and storing databases of a large number of access point locations ..."
Abstract
- Add to MetaCart
Wireless network hotspots, such as 802.11b WiFi access points, can be used as beacons that provide an inexpensive, large-scale, and privacy-sensitive way of determining one’s current location. This approach, however, requires creating and storing databases of a large number of access point
An Architecture for Privacy-preserving Mining of Client Information
, 2002
"... Due to privacy concerns, clients of some services may not want to reveal their private information. Even in these situations, data mining is feasible without sacrificing user privacy. Prior approaches to this problem generally trade o# accuracy for security, without giving provable bounds on securit ..."
Abstract
-
Cited by 27 (6 self)
- Add to MetaCart
Due to privacy concerns, clients of some services may not want to reveal their private information. Even in these situations, data mining is feasible without sacrificing user privacy. Prior approaches to this problem generally trade o# accuracy for security, without giving provable bounds
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
, 2009
"... Verifiable Computation enables a computationally weak client to “outsource ” the computation of a function F on various inputs x1,...,xk to one or more workers. The workers return the result of the function evaluation, e.g., yi = F(xi), as well as a proof that the computation of F was carried out co ..."
Abstract
-
Cited by 221 (13 self)
- Add to MetaCart
-length of the output of F. The protocol requires a one-time pre-processing stage by the client which takes O(|C|) time, where C is the smallest Boolean circuit computing F. Our scheme also provides input and output privacy for the client, meaning that the workers do not learn any information about the xi or yi values
Results 1 - 10
of
1,083