Sciweavers

234 search results - page 25 / 47
» Composition and Generalization of Context Data for Privacy P...
Sort
View
EDBT
2010
ACM
237views Database» more  EDBT 2010»
14 years 2 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
WPES
2005
ACM
14 years 1 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
HUC
2003
Springer
14 years 26 days ago
liquid: Context-Aware Distributed Queries
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...
CCS
2008
ACM
13 years 9 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
ICDE
2009
IEEE
132views Database» more  ICDE 2009»
14 years 9 months ago
Using Anonymized Data for Classification
In recent years, anonymization methods have emerged as an important tool to preserve individual privacy when releasing privacy sensitive data sets. This interest in anonymization t...
Ali Inan, Murat Kantarcioglu, Elisa Bertino