Sciweavers

2705 search results - page 61 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 9 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
CSFW
2012
IEEE
11 years 11 months ago
Verifying Privacy-Type Properties in a Modular Way
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
Myrto Arapinis, Vincent Cheval, Stéphanie D...
IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
14 years 2 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 3 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
JIPS
2010
154views more  JIPS 2010»
13 years 3 months ago
Mining Spatio-Temporal Patterns in Trajectory Data
Spatio-temporal patterns extracted from historical trajectories of moving objects reveal important knowledge about movement behavior for high quality LBS services. Existing approac...
Juyoung Kang 0002, Hwan-Seung Yong