HEAL DSpace

Moving e-commerce with PIVOTS: Private information viewing offering total safety

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Yannopoulos, A en
dc.contributor.author Stavroulas, Y en
dc.contributor.author Varvarigou, TA en
dc.date.accessioned 2014-03-01T01:21:06Z
dc.date.available 2014-03-01T01:21:06Z
dc.date.issued 2004 en
dc.identifier.issn 1041-4347 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/16062
dc.subject Access control en
dc.subject e-commerce en
dc.subject Internet search en
dc.subject Relevance feedback en
dc.subject Security en
dc.subject.classification Computer Science, Artificial Intelligence en
dc.subject.classification Computer Science, Information Systems en
dc.subject.classification Engineering, Electrical & Electronic en
dc.subject.other Algorithms en
dc.subject.other Data acquisition en
dc.subject.other Information retrieval en
dc.subject.other Internet en
dc.subject.other Mathematical models en
dc.subject.other Neural networks en
dc.subject.other Parameter estimation en
dc.subject.other Security of data en
dc.subject.other Statistical methods en
dc.subject.other User interfaces en
dc.subject.other Access control en
dc.subject.other Internet search en
dc.subject.other Relevance feedback en
dc.subject.other Security en
dc.subject.other Electronic commerce en
dc.title Moving e-commerce with PIVOTS: Private information viewing offering total safety en
heal.type journalArticle en
heal.identifier.primary 10.1109/TKDE.2004.10 en
heal.identifier.secondary http://dx.doi.org/10.1109/TKDE.2004.10 en
heal.language English en
heal.publicationDate 2004 en
heal.abstract We present a technology which enables wide-scale deployment of a unique and powerful data access and search tool. This tool makes it possible for content owners on the Internet to offer end-users the ability to search, assess, or otherwise examine their nondisclosable private data. The end-users may use arbitrary, distrusted assessment algorithms and receive the results which are produced. These results take the form of a meaningful digest, e. g., a useful statistic, a relevance assessment, etc. There exists some controllable danger of information theft which, however, is quantitatively dependent on system parameters and can be tuned accordingly. We consider a broad class of practical applications where brute force attacks exist which are easier and cheaper to implement than an attack through appropriately configured PIVOTS, making our system, effectively, very trustworthy. The actual creation of the search algorithm may be performed by the end-users themselves in specialized applications, or by third-party search-engine operators who offer their services to end-users. Sophisticated data mining technologies which are very often not directly available to content owners can thus be exploited to mine even private data collections. Users discovering interesting items in private data sets may purchase this specific data, but other desirable exploitation possibilities are also analyzed. A novel business model is presented and its potential for great impact on e-commerce is explored. Three diverse and important real-world applications are presented in conclusion. en
heal.publisher IEEE COMPUTER SOC en
heal.journalName IEEE Transactions on Knowledge and Data Engineering en
dc.identifier.doi 10.1109/TKDE.2004.10 en
dc.identifier.isi ISI:000220977900001 en
dc.identifier.volume 16 en
dc.identifier.issue 6 en
dc.identifier.spage 641 en
dc.identifier.epage 652 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής