Sciweavers

2272 search results - page 34 / 455
» Provable Data Privacy
Sort
View
DMIN
2006
115views Data Mining» more  DMIN 2006»
13 years 9 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
FC
2009
Springer
121views Cryptology» more  FC 2009»
14 years 2 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
PAKDD
2005
ACM
115views Data Mining» more  PAKDD 2005»
14 years 1 months ago
Performance Measurements for Privacy Preserving Data Mining
Abstract. This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy ...
Nan Zhang 0004, Wei Zhao, Jianer Chen
EDBT
2012
ACM
262views Database» more  EDBT 2012»
11 years 10 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 2 months ago
Differential Privacy for Clinical Trial Data: Preliminary Evaluations
—The concept of differential privacy as a rigorous definition of privacy has emerged from the cryptographic community. However, further careful evaluation is needed before we ca...
Duy Vu, Aleksandra Slavkovic