Sciweavers

5255 search results - page 123 / 1051
» Formal Methods for Privacy
Sort
View
SAS
2010
Springer
126views Formal Methods» more  SAS 2010»
15 years 29 days ago
From Object Fields to Local Variables: A Practical Approach to Field-Sensitive Analysis
Elvira Albert, Puri Arenas, Samir Genaim, German P...
101
Voted
SAS
2010
Springer
152views Formal Methods» more  SAS 2010»
15 years 29 days ago
Modelling Metamorphism by Abstract Interpretation
Mila Dalla Preda, Roberto Giacobazzi, Saumya K. De...
117
Voted
ISOLA
2010
Springer
15 years 15 days ago
Dependability Analysis and Verification for Connected Systems
Felicita Di Giandomenico, Marta Z. Kwiatkowska, Ma...
135
Voted
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 2 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
JIDM
2010
122views more  JIDM 2010»
15 years 1 months ago
Revisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering w...
Stanley R. M. Oliveira, Osmar R. Zaïane