M. Richardson, R. Agrawal, and P. Domingos,“Trust Management for the Semantic Web,” Proc. 2nd Int’l Semantic Web Conf., LNCS 2870, Springer-Verlag, 2003, pp. 351–368
M. Richardson, R. Agrawal, and P. Domingos,“Trust Management for the Semantic Web,” Proc. 2nd Int’l Semantic Web Conf., LNCS 2870, Springer-Verlag, 2003, pp. 351–368.
P. Schiegg et al., “Supply Chain Management Systems—A Survey of the State of the Art,” Collaborative Systems for Production Management:Proc. 8th Int’l Conf. Advances inProduction Management Systems (APMS 2002), IFIP Conf. Proc. 257, Kluwer, 2002.
N.C. Romano Jr. and J. Fjermestad, “Electronic Commerce Customer Relationship Management: A Research Agenda,” InformationTechnology and Management, vol. 4, nos. 2–3, 2003, pp. 233–258.
The privacy loss for the attribute with the highest weight
Two types of privacy loss (1)
Query-independent privacy loss
User determines her private attributes
Query-independent loss characterizes how helpful provided credentials for an adversarial to determine the probability density or probability mass function of a private attribute.
Two types of privacy loss (2)
Query-dependent privacy loss
User determines a set of potential queries Q that she is reluctant to answer
Provided credentials reveal information of attribute set A. Q is a function of A.
Query-dependent loss characterizes how helpful provided credentials for an adversarial to determine the probability density or probability mass function of Q.