Sciweavers

656 search results - page 19 / 132
» Noiseless Database Privacy
Sort
View
COMAD
2008
13 years 11 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
12 years 9 days ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 8 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
PODS
2008
ACM
174views Database» more  PODS 2008»
14 years 10 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
DASFAA
2004
IEEE
164views Database» more  DASFAA 2004»
14 years 1 months ago
On Addressing Efficiency Concerns in Privacy-Preserving Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage users to...
Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa