Sciweavers

2272 search results - page 83 / 455
» Provable Data Privacy
Sort
View
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
14 years 8 months ago
Privacy Preserving OLAP
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
Rakesh Agrawal, Ramakrishnan Srikant, Dilys Thomas
DASFAA
2004
IEEE
164views Database» more  DASFAA 2004»
13 years 11 months ago
On Addressing Efficiency Concerns in Privacy-Preserving Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage users to...
Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa
TDP
2010
88views more  TDP 2010»
13 years 2 months ago
P-Sensitive K-Anonymity with Generalization Constraints
Numerous privacy models based on the kanonymity property and extending the kanonymity model have been introduced in the last few years in data privacy re search: ldiversity, psen...
Alina Campan, Traian Marius Truta, Nicholas Cooper
DIM
2008
ACM
13 years 9 months ago
Proposal of privacy policy matching engine
We propose a system called "Privacy Policy Matching Engine", which enables a matching of a user's intention to provide his/her identity-related data and enterprises...
Takao Kojima, Yukio Itakura
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li