Sciweavers

114 search results - page 10 / 23
» On the Privacy of Concealed Data Aggregation
Sort
View
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 1 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
PODS
2001
ACM
148views Database» more  PODS 2001»
14 years 7 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
JCDL
2006
ACM
141views Education» more  JCDL 2006»
14 years 1 months ago
An architecture for the aggregation and analysis of scholarly usage data
Although recording of usage data is common in scholarly information services, its exploitation for the creation of valueadded services remains limited due to concerns regarding, a...
Johan Bollen, Herbert Van de Sompel
PODS
2012
ACM
244views Database» more  PODS 2012»
11 years 9 months ago
A rigorous and customizable framework for privacy
In this paper we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized t...
Daniel Kifer, Ashwin Machanavajjhala
CCS
2006
ACM
13 years 11 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song