Sciweavers

24 search results - page 4 / 5
» Protecting data privacy through hard-to-reverse negative dat...
Sort
View
ADC
2010
Springer
204views Database» more  ADC 2010»
13 years 1 months ago
Systematic clustering method for l-diversity model
Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an eff...
Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxian...
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 8 days ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
13 years 6 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 6 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
ICDE
2009
IEEE
124views Database» more  ICDE 2009»
14 years 23 days ago
An Architecture for Regulatory Compliant Database Management
— Spurred by financial scandals and privacy concerns, governments worldwide have moved to ensure confidence in digital records by regulating their retention and deletion. These...
Soumyadeb Mitra, Marianne Winslett, Richard T. Sno...