default search action
2. ISIPS 2008: New Brunswick, NJ, USA
- Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk:
Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers. Lecture Notes in Computer Science 5661, Springer 2009, ISBN 978-3-642-10232-5 - Paul B. Kantor, Michael E. Lesk:
The Challenges of Seeking Security While Respecting Privacy. 1-10
Statement of the Problem
- Maureen Baginski:
Intelligence Policy and the Science of Intelligence. 11-19 - Eugene H. Spafford:
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. 20-33 - Robyn R. Mace:
Intelligence, Dataveillance, and Information Privacy. 34-44 - Carl E. Landwehr:
Results of Workshops on Privacy Protection Technologies. 45-56 - James J. Horning:
Words Matter: Privacy, Security, and Related Terms. 57-62
Theoretical Approaches to the Problem
- Slava Kisilevich, Yuval Elovici, Bracha Shapira, Lior Rokach:
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity. 63-81 - Stephen E. Fienberg, Yuval Nardi, Aleksandra B. Slavkovic:
Valid Statistical Analysis for Logistic Regression with Multiple Sources. 82-94
Practical Approaches to the Problem
- Joan T. McNamara:
Suspicious Activity Reporting (SAR). 95-103 - Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov:
Stable Statistics of the Blogograph. 104-114 - Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu:
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). 115-121 - Giovanni Di Crescenzo:
On the Statistical Dependency of Identity Theft on Demographics. 122-137
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.