Sciweavers

2355 search results - page 130 / 471
» Anonymizing Temporal Data
Sort
View
CCS
2010
ACM
14 years 4 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
ICDE
2009
IEEE
392views Database» more  ICDE 2009»
15 years 10 months ago
FF-Anonymity: When Quasi-Identifiers Are Missing
Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA). This ...
Ada Wai-Chee Fu, Ke Wang, Raymond Chi-Wing Wong, Y...
ICDE
2009
IEEE
141views Database» more  ICDE 2009»
14 years 12 months ago
Privacy Preserving Publishing on Multiple Quasi-identifiers
In some applications of privacy preserving data publishing, a practical demand is to publish a data set on multiple quasi-identifiers for multiple users simultaneously, which poses...
Jian Pei, Yufei Tao, Jiexing Li, Xiaokui Xiao
ISCIS
2009
Springer
14 years 2 months ago
PopulusLog: People information database
—Information about individuals on publicly available web sites stands as a valuable, yet unorganized, data source. Turning such an enormous data source into a “database” is h...
Ali Cakmak, Mustafa Kirac, Gultekin Özsoyoglu
ERCIMDL
2000
Springer
98views Education» more  ERCIMDL 2000»
14 years 1 months ago
Personal Data in a Large Digital Library
The RePEc Economics library offers the largest distributed source of freely downloadable scientific research reports in the world. RePEc also contains details about Economics inst...
José Manuel Barrueco Cruz, Markus J. R. Kli...