Sciweavers

62 search results - page 10 / 13
» Privacy Problems with Anonymized Transaction Databases
Sort
View
EDBTW
2010
Springer
14 years 3 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
SIGKDD
2010
159views more  SIGKDD 2010»
13 years 7 months ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 10 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
14 years 2 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 9 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng