Sciweavers

2272 search results - page 165 / 455
» Provable Data Privacy
Sort
View
COMPGEOM
2009
ACM
14 years 5 months ago
Quadrilateral meshes with bounded minimum angle
In this paper, we present an algorithm that utilizes a quadtree data structure to construct a strictly convex quadrilateral mesh for a simple polygonal region in which no newly cr...
Scott Hine, F. Betul Atalay, Dianna Xu, Suneeta Ra...
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
15 years 11 hour ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
15 years 11 days ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 8 months ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 10 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li