Sciweavers

2272 search results - page 91 / 455
» Provable Data Privacy
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
14 years 1 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 2 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
EDBT
2010
ACM
237views Database» more  EDBT 2010»
14 years 2 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
PERCOM
2010
ACM
13 years 6 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi