Sciweavers

185 search results - page 12 / 37
» Non-homogeneous generalization in privacy preserving data pu...
Sort
View
ICDT
2010
ACM
172views Database» more  ICDT 2010»
14 years 9 days ago
k-jump strategy for preserving privacy in micro-data disclosure
In disclosing micro-data with sensitive attributes, the goal is usually two fold. First, the data utility of disclosed data should be maximized for analysis purposes. Second, the ...
Wen Ming Liu, Lingyu Wang, Lei Zhang
ICDE
2005
IEEE
121views Database» more  ICDE 2005»
14 years 8 months ago
Top-Down Specialization for Information and Privacy Preservation
Releasing person-specific data in its most specific state poses a threat to individual privacy. This paper presents a practical and efficient algorithm for determining a generaliz...
Benjamin C. M. Fung, Ke Wang, Philip S. Yu
DASFAA
2004
IEEE
164views Database» more  DASFAA 2004»
13 years 11 months ago
On Addressing Efficiency Concerns in Privacy-Preserving Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage users to...
Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa
CCS
2008
ACM
13 years 9 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
ICDE
2008
IEEE
177views Database» more  ICDE 2008»
14 years 8 months ago
On Anti-Corruption Privacy Preserving Publication
This paper deals with a new type of privacy threat, called "corruption", in anonymized data publication. Specifically, an adversary is said to have corrupted some individ...
Yufei Tao, Xiaokui Xiao, Jiexing Li, Donghui Zhang