Sciweavers

151 search results - page 1 / 31
» Minimality Attack in Privacy Preserving Data Publishing
Sort
View
VLDB
2007
ACM
138views Database» more  VLDB 2007»
13 years 10 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...
ICDM
2009
IEEE
172views Data Mining» more  ICDM 2009»
13 years 11 months ago
Fine-Grain Perturbation for Privacy Preserving Data Publishing
— Recent work [12] shows that conventional privacy preserving publishing techniques based on anonymity-groups are susceptible to corruption attacks. In a corruption attack, if th...
Rhonda Chaytor, Ke Wang, Patricia Brantingham
ICDE
2007
IEEE
198views Database» more  ICDE 2007»
14 years 5 months ago
Worst-Case Background Knowledge for Privacy-Preserving Data Publishing
Recent work has shown the necessity of considering an attacker's background knowledge when reasoning about privacy in data publishing. However, in practice, the data publishe...
David J. Martin, Daniel Kifer, Ashwin Machanavajjh...
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
13 years 4 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
PVLDB
2010
65views more  PVLDB 2010»
13 years 2 months ago
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data
The principle of anonymization for data sharing has become a very popular paradigm for the preservation of privacy of the data sub
Graham Cormode, Ninghui Li, Tiancheng Li, Divesh S...