Sciweavers

208 search results - page 7 / 42
» Privacy-Preserving Sharing of Sensitive Information
Sort
View
DMIN
2006
115views Data Mining» more  DMIN 2006»
13 years 9 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
ICWS
2009
IEEE
14 years 4 months ago
Service-Oriented Architecture for Privacy-Preserving Data Mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers t...
Thomas Trojer, Benjamin C. M. Fung, Patrick C. K. ...
ICDE
2008
IEEE
177views Database» more  ICDE 2008»
14 years 9 months ago
On Anti-Corruption Privacy Preserving Publication
This paper deals with a new type of privacy threat, called "corruption", in anonymized data publication. Specifically, an adversary is said to have corrupted some individ...
Yufei Tao, Xiaokui Xiao, Jiexing Li, Donghui Zhang
SIGMOD
2007
ACM
115views Database» more  SIGMOD 2007»
14 years 7 months ago
Privacy preserving schema and data matching
In many business scenarios, record matching is performed across different data sources with the aim of identifying common information shared among these sources. However such need...
Monica Scannapieco, Ilya Figotin, Elisa Bertino, A...