Sciweavers

1005 search results - page 73 / 201
» Privacy Preserving Clustering
Sort
View
IEEEIAS
2007
IEEE
14 years 4 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 4 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
EUPROJECTS
2006
Springer
14 years 1 months ago
Web Mediators for Accessible Browsing
We present a highly accurate method for classifying web pages based on link percentage, which is the percentage of text characters that are parts of links normalized by the number...
Benjamin N. Waber, John J. Magee, Margrit Betke
ECSCW
1993
13 years 11 months ago
Design for Privacy in Ubiquitous Computing Environments
Abstract: Current developments in information technology are leading to increasing capture and storage of information about people and their activities. This raises serious issues ...
Victoria Bellotti, Abigail Sellen
TDP
2008
96views more  TDP 2008»
13 years 10 months ago
Constrained Microaggregation: Adding Constraints for Data Editing
Privacy preserving data mining and statistical disclosure control have introduced several methods for data perturbation that can be used for ensuring the privacy of data respondent...
Vicenç Torra