Sciweavers

656 search results - page 35 / 132
» Noiseless Database Privacy
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 11 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICDE
2006
IEEE
113views Database» more  ICDE 2006»
14 years 3 months ago
PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework
Non Disclosure Agreements(NDAs) in real life are typically used whenever there is transfer of private or confidential information from one organization to another. The provider o...
Vikram Goyal, Shyam K. Gupta, Indira Meshram, Anan...
DMKD
2004
ACM
136views Data Mining» more  DMKD 2004»
14 years 3 months ago
Mining association rules with non-uniform privacy concerns
Privacy concerns have become an important issue in data mining. A popular way to preserve privacy is to randomize the dataset to be mined in a systematic way and mine the randomiz...
Yi Xia, Yirong Yang, Yun Chi
PSD
2010
Springer
154views Database» more  PSD 2010»
13 years 8 months ago
Coprivacy: Towards a Theory of Sustainable Privacy
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her...
Josep Domingo-Ferrer
TDP
2010
140views more  TDP 2010»
13 years 4 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...