IEEE/WIC/ACM International Conference on Web Intelligence (WI'04)
DOI: 10.1109/wi.2004.10147
|View full text |Cite
|
Sign up to set email alerts
|

Meeting Scheduling Guaranteeing n/2-Privacy and Resistant to Statistical Analysis (Applicable to any DisCSP)

Abstract: Distributed problems raise privacy issues. The user would like to specify securely his constraints (desires, availability, money)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…In existing works, several approaches have been developed to deal with privacy in DCOPs. Some cryptographic approaches offer certain end-to-end security guarantees by integrating the entire solving process in one primitive for DisCSPs or for DCOPs, the highest level of such privacy guarantees being achievable only for problems with a single variable [54]. Other cryptographic approaches are hybrids interlacing cryptographic and artificial intelligence steps [57], [21], [24].…”
Section: B Privacymentioning
confidence: 99%
“…In existing works, several approaches have been developed to deal with privacy in DCOPs. Some cryptographic approaches offer certain end-to-end security guarantees by integrating the entire solving process in one primitive for DisCSPs or for DCOPs, the highest level of such privacy guarantees being achievable only for problems with a single variable [54]. Other cryptographic approaches are hybrids interlacing cryptographic and artificial intelligence steps [57], [21], [24].…”
Section: B Privacymentioning
confidence: 99%
“…In the literature, the four most relevant bodies of work that address privacy in scheduling or similar scenarios are based on techniques from private set-intersection (Kissner and Song, 2005;De Cristofaro and Tsudik, 2010), distributed constraint satisfaction (Wallace and Freuder, 2005;Yokoo et al, 2005;Silaghi and Mitra, 2004;Silaghi, 2004), secure multi-party computation (Herlea et al, 2001;Du and Atallah, 2001) and e-voting (Kellermann and Böhme, 2009). Hereafter, we review the most relevant aspects of such approaches.…”
Section: State Of the Artmentioning
confidence: 99%
“…In the literature, the four most relevant bodies of work that address privacy in scheduling or similar scenarios are based on techniques from private set-intersection [20,11], distributed constraint satisfaction [27,28,24,25], secure multi-party computation [18,12] and e-voting [19]. Hereafter, we review the most relevant aspects of such approaches.…”
Section: State Of the Artmentioning
confidence: 99%
“…Privacy-preserving scheduling problems have been extensively studied in the past by researchers from the theoretical perspective, for instance, by modeling them as set intersection problems [20,11], distributed constraint satisfaction problems [27,28,24,25], secure multi-party computation problems [18,12] and by framing them in the e-voting context [19]. Traditionally, there are two possible approaches to the scheduling problems: distributed and centralized.…”
Section: Introductionmentioning
confidence: 99%