Sciweavers

656 search results - page 99 / 132
» Noiseless Database Privacy
Sort
View
ICDE
2009
IEEE
392views Database» more  ICDE 2009»
15 years 9 months ago
FF-Anonymity: When Quasi-Identifiers Are Missing
Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA). This ...
Ada Wai-Chee Fu, Ke Wang, Raymond Chi-Wing Wong, Y...
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
14 years 11 months ago
InstantDB: Enforcing Timely Degradation of Sensitive Data
- People cannot prevent personal information from being collected by various actors. Several security measures are implemented on servers to minimize the possibility of a privacy v...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 11 months ago
Mondrian Multidimensional K-Anonymity
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving kanonymity...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
14 years 10 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
ADC
2009
Springer
141views Database» more  ADC 2009»
14 years 4 months ago
Event-based Communication for Location-based Service Collaboration
Location-based context-aware services for mobile users need to collaborate in disparate networks. Services come and go as the user moves and no central repository is available. Th...
Annika Hinze, Yann Michel, Lisa Eschner