Sciweavers

1335 search results - page 102 / 267
» Privacy in Database Publishing
Sort
View
SIGMOD
2005
ACM
97views Database» more  SIGMOD 2005»
16 years 4 months ago
Incognito: Efficient Full-Domain K-Anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and So...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
IC
2003
15 years 5 months ago
WODA - A Web Services Generator
— The default storage system for the World Wide Web is the file system- the concept of a database is not built into the core of the HTTP protocols or into the HTML language. But ...
Ziga Turk
IEEEARES
2008
IEEE
15 years 10 months ago
A Bayesian Approach for on-Line Max Auditing
In this paper we propose a method for on-line max auditing of dynamic statistical databases. The method extends the Bayesian approach presented in [2], [3] and [4] for static data...
Gerardo Canfora, Bice Cavallo
150
Voted
GIS
2009
ACM
15 years 1 months ago
Distortion-based anonymity for continuous queries in location-based mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
Xiao Pan, Xiaofeng Meng, Jianliang Xu
HUC
2010
Springer
15 years 5 months ago
Exploring end user preferences for location obfuscation, location-based services, and the value of location
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can revea...
A. J. Bernheim Brush, John Krumm, James Scott