Sciweavers

5246 search results - page 5 / 1050
» Sanitization models and their limitations
Sort
View
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 10 months ago
Privacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-preserving data mining (PPDM) is an important topic to both industry and academia. In general there are two approaches to tackling PPDM, one is statistics-based and the oth...
Patrick Sharkey, Hongwei Tian, Weining Zhang, Shou...
SDMW
2007
Springer
14 years 3 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
PVLDB
2010
80views more  PVLDB 2010»
13 years 8 months ago
Fragments and Loose Associations: Respecting Privacy in Data Publishing
We propose a modeling of the problem of privacy-compliant data publishing that captures confidentiality constraints on one side and visibility requirements on the other side. Con...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
INFOCOM
2011
IEEE
13 years 1 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
SAC
2009
ACM
14 years 2 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell