Sciweavers

1335 search results - page 57 / 267
» Privacy in Database Publishing
Sort
View
213
Voted
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 3 months ago
Privacy Preserving OLAP
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
Rakesh Agrawal, Ramakrishnan Srikant, Dilys Thomas
PODS
2006
ACM
121views Database» more  PODS 2006»
16 years 3 months ago
On the efficiency of checking perfect privacy
Privacy-preserving query-answering systems answer queries while provably guaranteeing that sensitive information is kept secret. One very attractive notion of privacy is perfect p...
Ashwin Machanavajjhala, Johannes Gehrke
134
Voted
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
15 years 3 months ago
Ranking Privacy Policy
Almost all company websites collect some information about the user in some form. The information may be a simple IP address of the host to extensive personal information about th...
Rajeev Agrawal, William I. Grosky, Farshad Fotouhi
156
Voted
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 6 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
133
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
A Critique of k-Anonymity and Some of Its Enhancements
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be repeated at least for k records. It has been shown that k-anonymity alone does...
Josep Domingo-Ferrer, Vicenç Torra