GT

G. Tillem

12 records found

The enhancements in computation technologies in the last decades enabled businesses to analyze the data that is collected through their systems which helps to improve their services. However, performing data analytics remains a challenging task for small- and medium-scale compani ...

Badass

Preserving privacy in behavioural advertising with applied secret sharing

Online advertising is a multi-billion dollar industry, forming the primary source of income for many publishers offering free web content. Serving advertisements tailored to users’ interests greatly improves the effectiveness of advertisements, and is believed to be beneficial to ...
Smart grids promise a more reliable, efficient, economically viable, and environment-friendly electricity infrastructure for the future. State estimation in smart grids plays a pivotal role in system monitoring, reliable operation, automation, and grid stabilization. However, the ...
We investigate the trade-off between privacy and solution quality that occurs when a k-anonymized database is used as input to the bin-packing optimization problem. To investigate the impact of the chosen anonymization method on this trade-off, we consider two recoding methods fo ...
Multi-party access control has been proposed to enable collaborative decision making for the protection of co-owned resources. In particular, multi-party access control aims to reconcile conflicts arising from the evaluation of policies authored by different stakeholders for join ...
Privacy-preserving data aggregation is growing in popularity due to the increasing amount of online services depending on user data. This information is privacy-sensitive, warranting the need for protection during data-processing. A wide variety of approaches have been considered ...
The increasing demand for data mining in business intelligence has led to a significant growth in the adoption of data mining as a service paradigm which enables companies to outsource their data and mining tasks to a cloud service provider. Despite the popularity of the paradigm ...

AHEad

Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

Online advertising is a rapidly growing industry, forming the primary source of income for many publishers that offer free web content. The practice of serving advertisements based on individuals' interests greatly improves the expected effectiveness of advertisements, and is bel ...

BAdASS

Preserving privacy in behavioural advertising with applied secret sharing

Online advertising forms the primary source of income for many publishers offering free web content by serving advertisements tailored to users’ interests. The privacy of users, however, is threatened by the widespread collection of data that is required for behavioural advertisi ...
Online Behavioural Advertising (OBA), the practice of showing advertisements based on a person’s web browsing behaviour, has become a vital component of the ad-supported web. The tracking of users’ browsing behaviour that is needed for OBA, however, raises privacy concerns. We gi ...
The growing complexity of software with respect to technological advances encourages model-based analysis of software systems for validation and verification. Process mining is one recently investigated technique for such analysis which enables the discovery of process models fro ...
Validation in a big software system can be managed by analysis of its behaviour through occasionally collected event logs. Process mining is a technique to perform software validation by discovering process models from event logs or by checking the conformance of the logs to a pr ...