Sciweavers

208 search results - page 5 / 42
» Privacy-Preserving Sharing of Sensitive Information
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation among different organiza...
Dingbang Xu, Peng Ning
FC
2009
Springer
150views Cryptology» more  FC 2009»
14 years 2 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 8 months ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 7 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
IJCMAM
2010
133views more  IJCMAM 2010»
13 years 4 months ago
Privacy Preserving Integration of Health Care Data
For health care related research studies the medical records of patients may need to be retrieved from multiple sites with different regulations on the disclosure of health inform...
Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R....