Sciweavers

1906 search results - page 56 / 382
» Data Privacy
Sort
View
93
Voted
TDP
2010
88views more  TDP 2010»
14 years 9 months ago
P-Sensitive K-Anonymity with Generalization Constraints
Numerous privacy models based on the kanonymity property and extending the kanonymity model have been introduced in the last few years in data privacy re search: ldiversity, psen...
Alina Campan, Traian Marius Truta, Nicholas Cooper
216
Voted
ICDE
2009
IEEE
141views Database» more  ICDE 2009»
16 years 4 months ago
Privacy Preserving Publishing on Multiple Quasi-identifiers
In some applications of privacy preserving data publishing, a practical demand is to publish a data set on multiple quasi-identifiers for multiple users simultaneously, which poses...
Jian Pei, Yufei Tao, Jiexing Li, Xiaokui Xiao
CCS
2010
ACM
15 years 1 months ago
PriMa: an effective privacy protection mechanism for social networks
In this paper, we propose PriMa (Privacy Manager), a privacy protection mechanism which supports semi-automated generation of access rules for users’ profile information. PriMa...
Anna Cinzia Squicciarini, Federica Paci, Smitha Su...
131
Voted
ICEB
2004
175views Business» more  ICEB 2004»
15 years 4 months ago
Privacy-Preserving Collaborative Association Rule Mining
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among parties i...
Justin Z. Zhan, Stan Matwin, Nathalie Japkowicz, L...
227
Voted
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
16 years 4 months ago
Preservation Of Patterns and Input-Output Privacy
Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...