Sciweavers

2355 search results - page 9 / 471
» Anonymizing Temporal Data
Sort
View
BIRTHDAY
2009
Springer
14 years 2 months ago
Foundations of Temporal Conceptual Data Models
Abstract. This chapter considers the different temporal constructs appeared in the literature of temporal conceptual models (timestamping and evolution constraints), and it provid...
Alessandro Artale, Enrico Franconi
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
14 years 1 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
JSW
2008
89views more  JSW 2008»
13 years 7 months ago
Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants
Abstract-- The computation of the union operator for different distributed datasets involves two challenges when participants are curious and can even act malicious: guaranteeing a...
Stefan Böttcher, Sebastian Obermeier
EUROSEC
2009
ACM
14 years 2 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
VLDB
2007
ACM
116views Database» more  VLDB 2007»
14 years 1 months ago
K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization
In this paper we observe that k-anonymizing a data set is strikingly similar to building a spatial index over the data set, so similar in fact that classical spatial indexing tech...
Tochukwu Iwuchukwu, Jeffrey F. Naughton