Sciweavers

61 search results - page 13 / 13
» Query Rewriting Algorithm Evaluation for XML Security Views
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
13 years 11 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava