Sciweavers

2272 search results - page 46 / 455
» Provable Data Privacy
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
14 years 2 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
ICDM
2008
IEEE
130views Data Mining» more  ICDM 2008»
14 years 2 months ago
Inference Analysis in Privacy-Preserving Data Re-publishing
Privacy-Preserving Data Re-publishing (PPDR) deals with publishing microdata in dynamic scenarios. Due to privacy concerns, data must be disguised before being published. Research...
Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng
INFOCOM
2007
IEEE
14 years 2 months ago
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Abstract— Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy...
Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, ...
SIGMOD
2007
ACM
115views Database» more  SIGMOD 2007»
14 years 8 months ago
Privacy preserving schema and data matching
In many business scenarios, record matching is performed across different data sources with the aim of identifying common information shared among these sources. However such need...
Monica Scannapieco, Ilya Figotin, Elisa Bertino, A...