Sciweavers

114 search results - page 21 / 23
» On the Privacy of Concealed Data Aggregation
Sort
View
JDM
2000
128views more  JDM 2000»
13 years 7 months ago
Distributed Database Design for Mobile Geographical Applications
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...
Manhoi Choy, Mei-Po Kwan, Hong Va Leong
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
14 years 19 days ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 7 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
CHI
2010
ACM
14 years 20 days ago
Trained to accept?: a field experiment on consent dialogs
A typical consent dialog was shown in 2×2×3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a volun...
Rainer Böhme, Stefan Köpsell
EDBT
2009
ACM
145views Database» more  EDBT 2009»
13 years 11 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...