Sciweavers

656 search results - page 73 / 132
» Noiseless Database Privacy
Sort
View
ACISP
2004
Springer
14 years 3 months ago
Single Database Private Information Retrieval with Logarithmic Communication
In this paper, we study the problem of single database private information retrieval, and present schemes with only logarithmic server-side communication complexity. Previously th...
Yan-Cheng Chang
DMKD
2004
ACM
115views Data Mining» more  DMKD 2004»
14 years 3 months ago
Privacy-preserving data integration and sharing
Integrating data from multiple sources has been a longstanding challenge in the database community. Techniques such as privacy-preserving data mining promises privacy, but assume ...
Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gun...
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
14 years 11 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 11 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 10 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...