Sciweavers

2217 search results - page 38 / 444
» A Data Privacy Taxonomy
Sort
View
GLOBE
2009
Springer
14 years 2 months ago
Protecting Data Privacy in Structured P2P Networks
P2P systems are increasingly used for efficient, scalable data sharing. Popular applications focus on massive file sharing. However, advanced applications such as online communiti...
Mohamed Jawad, Patricia Serrano-Alvarado, Patrick ...
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
14 years 10 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
14 years 4 months ago
PRIVATE-IYE: A Framework for Privacy Preserving Data Integration
Data integration has been a long standing challenge to the database and data mining communities. This need has become critical in numerous contexts, including building e-commerce ...
Sourav S. Bhowmick, Le Gruenwald, Mizuho Iwaihara,...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 10 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
DEXA
2005
Springer
93views Database» more  DEXA 2005»
14 years 3 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer