Sciweavers

2217 search results - page 163 / 444
» A Data Privacy Taxonomy
Sort
View
CCS
2010
ACM
15 years 10 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
TIS
2002
74views more  TIS 2002»
15 years 3 months ago
Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness
: Modern information systems not only capture a seemingly endless amount of transactional data, but also tend to retain it for indefinite periods of time. We argue that privacy pol...
Jean-François Blanchette, Deborah G. Johnso...
PODS
2005
ACM
96views Database» more  PODS 2005»
16 years 4 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
SIGCOMM
2009
ACM
15 years 10 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
AISADM
2005
Springer
15 years 9 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...