Sciweavers

116 search results - page 10 / 24
» On the Design and Quantification of Privacy Preserving Data ...
Sort
View
ASIACRYPT
2005
Springer
14 years 18 days ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 8 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
CORR
2008
Springer
159views Education» more  CORR 2008»
13 years 7 months ago
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data
We consider privacy preserving decision tree induction via ID3 in the case where the training data is horizontally or vertically distributed. Furthermore, we consider the same pro...
Bart Kuijpers, Vanessa Lemmens, Bart Moelans, Karl...
CIKM
2006
Springer
13 years 10 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
DAWAK
2005
Springer
14 years 18 days ago
FMC: An Approach for Privacy Preserving OLAP
To preserve private information while providing thorough analysis is one of the significant issues in OLAP systems. One of the challenges in it is to prevent inferring the sensitiv...
Ming Hua, Shouzhi Zhang, Wei Wang 0009, Haofeng Zh...