Sciweavers

67 search results - page 3 / 14
» Anonymizing transaction databases for publication
Sort
View
VLDB
2005
ACM
86views Database» more  VLDB 2005»
13 years 10 months ago
Database Publication Practices
There has been a growing interest in improving the publication processes for database research papers. This panel reports on recent changes in those processes and presents an init...
Philip A. Bernstein, David J. DeWitt, Andreas Heue...
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
14 years 5 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
13 years 10 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 5 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
FC
2007
Springer
151views Cryptology» more  FC 2007»
13 years 11 months ago
Conditional E-Cash
Abstract. We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. P...
Larry Shi, Bogdan Carbunar, Radu Sion