Sciweavers

2217 search results - page 381 / 444
» A Data Privacy Taxonomy
Sort
View
145
Voted
SDM
2010
SIAM
183views Data Mining» more  SDM 2010»
15 years 5 months ago
GraSS: Graph Structure Summarization
Large graph databases are commonly collected and analyzed in numerous domains. For reasons related to either space efficiency or for privacy protection (e.g., in the case of socia...
Kristen LeFevre, Evimaria Terzi
84
Voted
SDM
2010
SIAM
128views Data Mining» more  SDM 2010»
15 years 5 months ago
Publishing Skewed Sensitive Microdata
A highly skewed microdata contains some sensitive attribute values that occur far more frequently than others. Such data violates the "eligibility condition" assumed by ...
Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Raymond Chi-Win...
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 5 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
TDP
2008
111views more  TDP 2008»
15 years 4 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
CSCW
2002
ACM
15 years 3 months ago
Who can claim complete abstinence from peeking at print jobs?
While systems supporting communities of practice in work organizations have been shown to be desirable many, if not all, are decoupled from daily work practices and tools. This hi...
Antonietta Grasso, Jean-Luc Meunier