Sciweavers

128 search results - page 10 / 26
» The Boundary Between Privacy and Utility in Data Publishing
Sort
View
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 7 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 10 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
SIGUCCS
2006
ACM
14 years 4 months ago
Automated podcasting solution expands the boundaries of the classroom
A scalable podcast solution developed at the University of Washington makes the podcasting of class lectures easy for faculty by automating the capture, uploading, and delivery of...
David Aldrich, Bradley Bell, Tim Batzel
ICDE
2010
IEEE
184views Database» more  ICDE 2010»
14 years 2 months ago
On optimal anonymization for l+-diversity
-- Publishing person specific data while protecting privacy is an important problem. Existing algorithms that enforce the privacy principle called l-diversity are heuristic based d...
Junqiang Liu, Ke Wang
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 4 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch