Sciweavers

515 search results - page 11 / 103
» Measuring Voter-Controlled Privacy
Sort
View
DAMON
2006
Springer
14 years 8 days ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
15 years 8 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
PAKDD
2005
ACM
115views Data Mining» more  PAKDD 2005»
14 years 2 months ago
Performance Measurements for Privacy Preserving Data Mining
Abstract. This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy ...
Nan Zhang 0004, Wei Zhao, Jianer Chen
MDAI
2010
Springer
13 years 6 months ago
Rational Privacy Disclosure in Social Networks
Social networking web sites or social networks for short (SNs) have become an important web service with a broad range of applications. In an SN, a user publishes and shares inform...
Josep Domingo-Ferrer