Sciweavers

2705 search results - page 43 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
FLAIRS
2000
13 years 9 months ago
Use of Data Mining on Satellite Data Bases for Knowledge Extraction
Extracting knowledge from existing sources of information is a key development area to unlock previously unknown relationships between specific data points. Data mining is a techn...
Lance Self
ICFCA
2007
Springer
13 years 11 months ago
A New and Useful Syntactic Restriction on Rule Semantics for Tabular Datasets
Different rule semantics have been successively defined in many contexts such as implications in artificial intelligence, functional dependencies in databases or association rules...
Marie Agier, Jean-Marc Petit
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 8 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
CCS
2004
ACM
14 years 1 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii