Sciweavers

87 search results - page 3 / 18
» Anonymized Data: Generation, models, usage
Sort
View
IMC
2003
ACM
13 years 11 months ago
Predicting resource usage and estimation accuracy in an IP flow measurement collection infrastructure
This paper describes a measurement infrastructure used to collect detailed IP traffic measurements from an IP backbone. Usage, i.e, bytes transmitted, is determined from raw NetF...
Nick G. Duffield, Carsten Lund
ICICS
2009
Springer
14 years 21 days ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
13 years 6 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
13 years 10 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 7 days ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...