Sciweavers

2355 search results - page 30 / 471
» Anonymizing Temporal Data
Sort
View
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 8 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
SIGCOMM
2010
ACM
13 years 7 months ago
Privacy-preserving P2P data sharing with OneSwarm
Privacy--the protection of information from unauthorized disclosure--is increasingly scarce on the Internet, and yet increasingly important as every user becomes both a content co...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
IH
2001
Springer
14 years 1 days ago
The Strong Eternity Service
Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how t...
Tonda Benes
IUI
2010
ACM
14 years 4 months ago
Temporal task footprinting: identifying routine tasks by their temporal patterns
This paper introduces a new representation for describing routine tasks, called temporal task footprints. Routines are characterized by their temporal regularity or rhythm. Tempor...
Oliver Brdiczka, Norman Makoto Su, James Bo Begole
CCS
2009
ACM
14 years 8 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao