Sciweavers

137 search results - page 1 / 28
» Privacy-Preserving Schema Matching Using Mutual Information
Sort
View
DBSEC
2007
89views Database» more  DBSEC 2007»
13 years 6 months ago
Privacy-Preserving Schema Matching Using Mutual Information
Isabel F. Cruz, Roberto Tamassia, Danfeng Yao
SIGMOD
2007
ACM
115views Database» more  SIGMOD 2007»
14 years 5 months ago
Privacy preserving schema and data matching
In many business scenarios, record matching is performed across different data sources with the aim of identifying common information shared among these sources. However such need...
Monica Scannapieco, Ilya Figotin, Elisa Bertino, A...
ICDE
2005
IEEE
121views Database» more  ICDE 2005»
14 years 6 months ago
Top-Down Specialization for Information and Privacy Preservation
Releasing person-specific data in its most specific state poses a threat to individual privacy. This paper presents a practical and efficient algorithm for determining a generaliz...
Benjamin C. M. Fung, Ke Wang, Philip S. Yu
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
13 years 10 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 6 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim