Sciweavers

233 search results - page 20 / 47
» Distributed Privacy Preserving Information Sharing
Sort
View
VLDB
2006
ACM
122views Database» more  VLDB 2006»
14 years 10 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
SEMWEB
2007
Springer
14 years 4 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 11 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
EDBT
2006
ACM
118views Database» more  EDBT 2006»
14 years 10 months ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi
EDBT
2009
ACM
128views Database» more  EDBT 2009»
14 years 1 months ago
HIDE: heterogeneous information DE-identification
While there is an increasing need to share data that may contain personal information, such data sharing must preserve individual privacy without disclosing any identifiable infor...
James J. Gardner, Li Xiong, Kanwei Li, James J. Lu