Sciweavers

175 search results - page 17 / 35
» Toward Privacy in Public Databases
Sort
View
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 5 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
EDBT
2004
ACM
108views Database» more  EDBT 2004»
14 years 7 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
EDBT
2010
ACM
110views Database» more  EDBT 2010»
14 years 2 months ago
The hardness and approximation algorithms for l-diversity
The existing solutions to privacy preserving publication can be classified into the theoretical and heuristic categories. The former guarantees provably low information loss, whe...
Xiaokui Xiao, Ke Yi, Yufei Tao
DGO
2004
109views Education» more  DGO 2004»
13 years 8 months ago
Citizens Preferences Towards One-Stop Government
The poster presents the major results of a survey conducted in several German cities to asses preferences citizens have towards aspects of One-Stop Government. One Stop Government...
Alexander Schellong, Dieter Mans
EDBTW
2010
Springer
14 years 2 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...