Sciweavers

67 search results - page 5 / 14
» Anonymizing transaction databases for publication
Sort
View
ICDE
2002
IEEE
217views Database» more  ICDE 2002»
14 years 9 months ago
Evaluating Top-k Queries over Web-Accessible Databases
Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires pr...
Nicolas Bruno, Luis Gravano, Amélie Marian
GIS
2009
ACM
13 years 5 months ago
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
We propose a location-based query anonymization technique, LBS (k,T)-anonymization, that ensures anonymity of user's query in a specific time window against what we call know...
Amirreza Masoumzadeh, James Joshi, Hassan A. Karim...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 9 months ago
On the Anonymization of Sparse High-Dimensional Data
Abstract-- Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as ka...
Gabriel Ghinita, Yufei Tao, Panos Kalnis
CIKM
2009
Springer
14 years 2 months ago
Online anonymity for personalized web services
To receive personalized web services, the user has to provide personal information and preferences, in addition to the query itself, to the web service. However, detailed personal...
Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu
FC
2000
Springer
127views Cryptology» more  FC 2000»
13 years 11 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung