Sciweavers

2355 search results - page 14 / 471
» Anonymizing Temporal Data
Sort
View
GIS
2007
ACM
14 years 8 months ago
Location anonymity in continuous location-based services
A major concern for large-scale deployment of location-based services (LBSs) is the potential abuse of their client location data, which may imply sensitive personal information. ...
Toby Xu, Ying Cai
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
13 years 5 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
SEC
1996
13 years 8 months ago
Location management strategies increasing privacy in mobile communication
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our obj...
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, A...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 9 months ago
On the Anonymization of Sparse High-Dimensional Data
Abstract-- Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as ka...
Gabriel Ghinita, Yufei Tao, Panos Kalnis
PVLDB
2010
65views more  PVLDB 2010»
13 years 6 months ago
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data
The principle of anonymization for data sharing has become a very popular paradigm for the preservation of privacy of the data sub
Graham Cormode, Ninghui Li, Tiancheng Li, Divesh S...