Sciweavers

656 search results - page 103 / 132
» Noiseless Database Privacy
Sort
View
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 2 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
13 years 11 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
DEBU
2002
81views more  DEBU 2002»
13 years 10 months ago
Profiling and Service Delivery in Internet-enabled Cars
This paper presents our experience applying web services and active database technology in an automotive scenario. Particularly, we concentrate on developing an infrastructure for...
Mariano Cilia, Alejandro P. Buchmann
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
13 years 7 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
NDSS
2008
IEEE
14 years 4 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion