Sciweavers

151 search results - page 2 / 31
» Minimality Attack in Privacy Preserving Data Publishing
Sort
View
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
14 years 6 months ago
Preserving Privacy in Social Networks Against Neighborhood Attacks
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
Bin Zhou 0002, Jian Pei
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
13 years 9 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
KDD
2008
ACM
162views Data Mining» more  KDD 2008»
14 years 5 months ago
Composition attacks and auxiliary information in data privacy
Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary informatio...
Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanat...
EDBT
2009
ACM
200views Database» more  EDBT 2009»
13 years 11 months ago
Continuous privacy preserving publishing of data streams
Recently, privacy preserving data publishing has received a lot of attention in both research and applications. Most of the previous studies, however, focus on static data sets. I...
Bin Zhou 0002, Yi Han, Jian Pei, Bin Jiang, Yufei ...
TDP
2008
160views more  TDP 2008»
13 years 4 months ago
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-ano...
Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius T...