Sciweavers

5246 search results - page 2 / 1050
» Sanitization models and their limitations
Sort
View
WETICE
2006
IEEE
13 years 10 months ago
Some Problems in Sanitizing Network Data
The problem of removing sensitive information from data before it is released publicly, or turned over to less trusted analysts, underlies much of the unwillingness to share data....
Matt Bishop, Rick Crawford, Bhume Bhumiratana, Lis...
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 7 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
14 years 5 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
ISPASS
2006
IEEE
13 years 10 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
13 years 11 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...