Sciweavers

1128 search results - page 8 / 226
» Structuring anonymity metrics
Sort
View
TKDE
2008
119views more  TKDE 2008»
13 years 7 months ago
Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies
Abstract--Individual privacy will be at risk if a published data set is not properly deidentified. k-Anonymity is a major technique to deidentify a data set. Among a number of k-an...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 2 months ago
Relations Among Privacy Notions
This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistingu...
Jens-Matthias Bohli, Andreas Pashalidis
COMPSAC
2006
IEEE
14 years 1 months ago
Design Structural Stability Metrics and Post-Release Defect Density: An Empirical Study
This paper empirically explores the correlations between a suite of structural stability metrics for object-oriented designs and post-release defect density. The investigated stab...
Mahmoud O. Elish, David C. Rine
NDSS
2008
IEEE
14 years 1 months ago
A Tune-up for Tor: Improving Security and Performance in the Tor Network
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
Robin Snader, Nikita Borisov
VLDB
2007
ACM
137views Database» more  VLDB 2007»
14 years 7 months ago
Fast Data Anonymization with Low Information Loss
Recent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy preserving paradigms of k-anonymity and -diversity. k-a...
Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, ...