Sciweavers

3395 search results - page 629 / 679
» Computational Differential Privacy
Sort
View
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 9 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
ISCI
2007
99views more  ISCI 2007»
13 years 9 months ago
Privacy-preserving algorithms for distributed mining of frequent itemsets
Standard algorithms for association rule mining are based on identification of frequent itemsets. In this paper, we study how to maintain privacy in distributed mining of frequen...
Sheng Zhong
TDP
2008
111views more  TDP 2008»
13 years 9 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
JDM
2000
128views more  JDM 2000»
13 years 9 months ago
Distributed Database Design for Mobile Geographical Applications
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...
Manhoi Choy, Mei-Po Kwan, Hong Va Leong
PVLDB
2010
135views more  PVLDB 2010»
13 years 8 months ago
P2PDocTagger: Content management through automated P2P collaborative tagging
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search,...
Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong ...