Sciweavers

382 search results - page 18 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
15 years 7 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
14 years 11 hour ago
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. The paradigm involves composing an all-or-nothing...
Anand Desai
CONEXT
2009
ACM
13 years 8 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
JTAER
2010
147views more  JTAER 2010»
13 years 6 months ago
Privacy Issues for Online Personal Photograph Collections
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...
Sally Jo Cunningham, Masood Masoodian, Anne Adams