Sciweavers

45 search results - page 7 / 9
» Obfuscated databases and group privacy
Sort
View
EDBT
2009
ACM
128views Database» more  EDBT 2009»
13 years 11 months ago
HIDE: heterogeneous information DE-identification
While there is an increasing need to share data that may contain personal information, such data sharing must preserve individual privacy without disclosing any identifiable infor...
James J. Gardner, Li Xiong, Kanwei Li, James J. Lu
EDBT
2009
ACM
195views Database» more  EDBT 2009»
14 years 1 months ago
Anonymizing moving objects: how to hide a MOB in a crowd?
Moving object databases (MOD) have gained much interest in recent years due to the advances in mobile communications and positioning technologies. Study of MOD can reveal useful i...
Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshm...
EDBT
2009
ACM
122views Database» more  EDBT 2009»
13 years 11 months ago
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Publishing microdata raises concerns of individual privacy. When there exist outlier records in the microdata, the distinguishability of the outliers enables their privacy to be e...
Hui (Wendy) Wang, Ruilin Liu
DEXA
2007
Springer
140views Database» more  DEXA 2007»
14 years 1 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
SSD
2009
Springer
141views Database» more  SSD 2009»
14 years 1 months ago
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
Abstract. Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, howev...
Kar Way Tan, Yimin Lin, Kyriakos Mouratidis