Sciweavers

2217 search results - page 46 / 444
» A Data Privacy Taxonomy
Sort
View
CCS
2006
ACM
14 years 1 months ago
Data collection with self-enforcing privacy
Consider a pollster who wishes to collect private, sensitive data from a number of distrustful individuals. How might the pollster convince the respondents that it is trustworthy?...
Philippe Golle, Frank McSherry, Ilya Mironov
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 10 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
14 years 4 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
ICDM
2008
IEEE
130views Data Mining» more  ICDM 2008»
14 years 4 months ago
Inference Analysis in Privacy-Preserving Data Re-publishing
Privacy-Preserving Data Re-publishing (PPDR) deals with publishing microdata in dynamic scenarios. Due to privacy concerns, data must be disguised before being published. Research...
Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng
INFOCOM
2007
IEEE
14 years 4 months ago
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Abstract— Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy...
Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, ...