Sciweavers

151 search results - page 18 / 31
» Minimality Attack in Privacy Preserving Data Publishing
Sort
View
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 5 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
ISI
2008
Springer
13 years 7 months ago
A framework for privacy-preserving cluster analysis
Abstract--Releasing person-specific data could potentially reveal sensitive information of individuals. k-anonymization is a promising privacy protection mechanism in data publishi...
Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad ...
VLDB
2006
ACM
122views Database» more  VLDB 2006»
14 years 8 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
ICDE
2012
IEEE
221views Database» more  ICDE 2012»
11 years 10 months ago
DPCube: Releasing Differentially Private Data Cubes for Health Information
—We demonstrate DPCube, a component in our Health Information DE-identification (HIDE) framework, for releasing differentially private data cubes (or multi-dimensional histogram...
Yonghui Xiao, James J. Gardner, Li Xiong
ICIP
2008
IEEE
14 years 9 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...