Sciweavers

2217 search results - page 106 / 444
» A Data Privacy Taxonomy
Sort
View
113
Voted
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 9 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
ESORICS
2005
Springer
15 years 9 months ago
Privacy Preserving Clustering
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together...
Somesh Jha, Louis Kruger, Patrick McDaniel
134
Voted
ESORICS
2008
Springer
15 years 5 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
394
Voted
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
17 years 3 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
143
Voted
CCS
2010
ACM
15 years 7 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...