Sciweavers

27 search results - page 1 / 6
» Preventing equivalence attacks in updated, anonymized data
Sort
View
ICDE
2011
IEEE
253views Database» more  ICDE 2011»
12 years 8 months ago
Preventing equivalence attacks in updated, anonymized data
—In comparison to the extensive body of existing work considering publish-once, static anonymization, dynamic anonymization is less well studied. Previous work, most notably
Yeye He, Siddharth Barman, Jeffrey F. Naughton
WISEC
2010
ACM
13 years 2 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
SIES
2009
IEEE
13 years 11 months ago
A wireless body sensor network for the prevention and management of asthma
—We present an application of an open source platform for wireless body sensor network called DexterNet to the problem of children’s asthma. The architecture of the system cons...
Edmund Y. W. Seto, Annarita Giani, Victor Shia, Cu...
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 4 months ago
Anonymity for continuous data publishing
k-anonymization is an important privacy protection mechanism in data publishing. While there has been a great deal of work in recent years, almost all considered a single static r...
Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jia...
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 4 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li