Sciweavers

128 search results - page 8 / 26
» The Boundary Between Privacy and Utility in Data Publishing
Sort
View
ISI
2005
Springer
14 years 1 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
14 years 1 months ago
Toward Privacy in Public Databases
Abstract. We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who...
Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam...
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 16 days ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
15 years 7 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
IPPS
2006
IEEE
14 years 1 months ago
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
A general approach to achieve anonymity on P2P networks is to construct an indirect path between client and server for each data transfer. The indirection, together with randomnes...
A. Brodie, Cheng-Zhong Xu, Weisong Shi