Sciweavers

2705 search results - page 52 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 9 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor
ASM
2010
ASM
13 years 9 months ago
Matelas: A Predicate Calculus Common Formal Definition for Social Networking
This paper presents Matelas, a B predicate calculus definition for social networking, modelling social-network content, privacy policies, social-networks friendship relations, and ...
Néstor Cataño, Camilo Rueda
FM
2009
Springer
95views Formal Methods» more  FM 2009»
14 years 3 months ago
Industrial Practice in Formal Methods: A Review
We examine the the industrial application of formal methods using data gathered in a review of 62 projects taking place over the last 25 years. The review suggests that formal meth...
Juan Bicarregui, John S. Fitzgerald, Peter Gorm La...
PODS
2012
ACM
244views Database» more  PODS 2012»
11 years 11 months ago
A rigorous and customizable framework for privacy
In this paper we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized t...
Daniel Kifer, Ashwin Machanavajjhala
VLDB
2008
ACM
147views Database» more  VLDB 2008»
14 years 9 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster