Sciweavers

74 search results - page 9 / 15
» Privacy: preserving trajectory collection
Sort
View
TDP
2008
96views more  TDP 2008»
13 years 7 months ago
Constrained Microaggregation: Adding Constraints for Data Editing
Privacy preserving data mining and statistical disclosure control have introduced several methods for data perturbation that can be used for ensuring the privacy of data respondent...
Vicenç Torra
ACSW
2007
13 years 9 months ago
Controlling Inference: Avoiding P-level Reduction during Analysis
This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to d...
Adepele Williams, Ken Barker
CIKM
2009
Springer
14 years 5 days ago
A novel approach for privacy mining of generic basic association rules
Data mining can extract important knowledge from large data collections - but sometimes these collections are split among various parties. Privacy concerns may prevent the parties...
Moez Waddey, Pascal Poncelet, Sadok Ben Yahia
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 2 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
IEEEIAS
2007
IEEE
14 years 1 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang