Sciweavers

208 search results - page 13 / 42
» Privacy-Preserving Sharing of Sensitive Information
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Analyzing use of privacy policy attributes in a location sharing application
Privacy in location sharing applications is particularly important due to the sensitivity of users’ geographical location. Privacy in most location sharing applications is provi...
Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cr...
VLDB
2007
ACM
137views Database» more  VLDB 2007»
14 years 7 months ago
Fast Data Anonymization with Low Information Loss
Recent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy preserving paradigms of k-anonymity and -diversity. k-a...
Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, ...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 2 months ago
Differential Privacy for Clinical Trial Data: Preliminary Evaluations
—The concept of differential privacy as a rigorous definition of privacy has emerged from the cryptographic community. However, further careful evaluation is needed before we ca...
Duy Vu, Aleksandra Slavkovic
PVLDB
2010
95views more  PVLDB 2010»
13 years 6 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
DMKD
2004
ACM
136views Data Mining» more  DMKD 2004»
14 years 1 months ago
Mining association rules with non-uniform privacy concerns
Privacy concerns have become an important issue in data mining. A popular way to preserve privacy is to randomize the dataset to be mined in a systematic way and mine the randomiz...
Yi Xia, Yirong Yang, Yun Chi