Sciweavers

91 search results - page 8 / 19
» Continuous privacy preserving publishing of data streams
Sort
View
COLCOM
2008
IEEE
13 years 9 months ago
Towards Continuous Workflow Enactment Systems
Abstract. Traditional workflow enactment systems and workflow design processes view the workflow as a one-time interaction with the various data sources, executing a series of step...
Panayiotis Neophytou, Panos K. Chrysanthis, Alexan...
CEAS
2008
Springer
13 years 9 months ago
A Mail Client Plugin for Privacy-Preserving Spam Filter Evaluation
We describe a plugin extension to the Thunderbird Mail Client to support standardized evaluation of multiple spam filters on private mail streams. Researchers need not view or han...
Mona Mojdeh, Gordon V. Cormack
WPES
2003
ACM
14 years 22 days ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
CRYPTO
2004
Springer
91views Cryptology» more  CRYPTO 2004»
14 years 26 days ago
Privacy-Preserving Datamining on Vertically Partitioned Databases
In a recent paper Dinur and Nissim considered a statistical database in which a trusted database administrator monitors queries and introduces noise to the responses with the goal ...
Cynthia Dwork, Kobbi Nissim
ICDE
2005
IEEE
121views Database» more  ICDE 2005»
14 years 8 months ago
Top-Down Specialization for Information and Privacy Preservation
Releasing person-specific data in its most specific state poses a threat to individual privacy. This paper presents a practical and efficient algorithm for determining a generaliz...
Benjamin C. M. Fung, Ke Wang, Philip S. Yu