Sciweavers

656 search results - page 86 / 132
» Noiseless Database Privacy
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recentl...
Bo Luo, Dongwon Lee, Peng Liu

Publication
715views
15 years 9 months ago
A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desire...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 9 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 10 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
VLDB
2007
ACM
137views Database» more  VLDB 2007»
14 years 10 months ago
Fast Data Anonymization with Low Information Loss
Recent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy preserving paradigms of k-anonymity and -diversity. k-a...
Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, ...