Sciweavers

126 search results - page 3 / 26
» Efficient Anonymizations with Enhanced Utility
Sort
View
DKE
2008
106views more  DKE 2008»
13 years 7 months ago
Towards optimal k-anonymization
When releasing microdata for research purposes, one needs to preserve the privacy of respondents while maximizing data utility. An approach that has been studied extensively in re...
Tiancheng Li, Ninghui Li
ATAL
2004
Springer
14 years 1 months ago
Negotiation to Improve Role Adoption in Organizations
We present negotiation schemes for efficient role adoption that enhance utility in organizations. In one scheme, local utility computations determine role adoption. In the second ...
Asad Rahman, Henry Hexmoor
JCP
2008
216views more  JCP 2008»
13 years 7 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
13 years 9 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
ICIP
2008
IEEE
14 years 2 months ago
Enhanced usability of iris recognition via efficient user interface and iris image restoration
In this paper, we investigate the possibility of enhancing the usability of iris recognition via exploration of the specular spots in iris images. Firstly, the spatial configurat...
Zhaofeng He, Zhenan Sun, Tieniu Tan, Xianchao Qiu