Sciweavers

165 search results - page 13 / 33
» Composition attacks and auxiliary information in data privac...
Sort
View
FUIN
2007
147views more  FUIN 2007»
13 years 7 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
ESORICS
2004
Springer
14 years 1 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
EDBT
2009
ACM
122views Database» more  EDBT 2009»
14 years 7 days ago
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Publishing microdata raises concerns of individual privacy. When there exist outlier records in the microdata, the distinguishability of the outliers enables their privacy to be e...
Hui (Wendy) Wang, Ruilin Liu
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
13 years 12 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
PODS
2010
ACM
184views Database» more  PODS 2010»
14 years 21 days ago
Universally optimal privacy mechanisms for minimax agents
A scheme that publishes aggregate information about sensitive data must resolve the trade-off between utility to information consumers and privacy of the database participants. D...
Mangesh Gupte, Mukund Sundararajan