Sciweavers

2272 search results - page 89 / 455
» Provable Data Privacy
Sort
View
ETRICS
2006
13 years 11 months ago
Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacypreserving decision tree mining method explored in the...
Jim Dowd, Shouhuai Xu, Weining Zhang
INTERACT
1997
13 years 9 months ago
Eigen-Space Coding as a Means to Support Privacy in Computer Mediated Communication
The current solutions to disclosing privacy in computer-mediated communication are two-fold: either the connection is permitted and an audio-video link is opened providing a full-b...
Joëlle Coutaz, James L. Crowley, Franç...
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 8 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
TDP
2010
166views more  TDP 2010»
13 years 2 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
14 years 2 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...