Sciweavers

698 search results - page 67 / 140
» Privacy Preserving OLAP
Sort
View
PVLDB
2010
65views more  PVLDB 2010»
13 years 7 months ago
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data
The principle of anonymization for data sharing has become a very popular paradigm for the preservation of privacy of the data sub
Graham Cormode, Ninghui Li, Tiancheng Li, Divesh S...
PODS
2007
ACM
122views Database» more  PODS 2007»
14 years 9 months ago
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
The contingency table is a work horse of official statistics, the format of reported data for the US Census, Bureau of Labor Statistics, and the Internal Revenue Service. In many ...
Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Sat...
ESORICS
2004
Springer
14 years 2 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 10 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 3 months ago
Differential Privacy for Clinical Trial Data: Preliminary Evaluations
—The concept of differential privacy as a rigorous definition of privacy has emerged from the cryptographic community. However, further careful evaluation is needed before we ca...
Duy Vu, Aleksandra Slavkovic