Sciweavers

IEEEIAS
2008
IEEE
13 years 11 months ago
Network Level Privacy for Wireless Sensor Networks
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
ICDM
2008
IEEE
95views Data Mining» more  ICDM 2008»
13 years 11 months ago
Publishing Sensitive Transactions for Itemset Utility
We consider the problem of publishing sensitive transaction data with privacy preservation. High dimensionality of transaction data poses unique challenges on data privacy and dat...
Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Che...
ESORICS
2009
Springer
13 years 11 months ago
The UNESCO Chair in Data Privacy Research in Vehicular Networks
An overview of the activities of the UNESCO Chair in Data Privacy is first given. One of these activities is research. We focus on the research conducted to conciliate security an...
Josep Domingo-Ferrer
EDBT
2010
ACM
237views Database» more  EDBT 2010»
13 years 11 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek

0
posts
with
0
views
341profile views
cheema154Student, PhD
University of New South Wales, Sydney
cheema154
I started my PhD studies in March 2008 under the joint supervision of Prof. Xuemin Lin and Dr. Wei Wang. My current research interests include spatial databases, uncertain database...
EDBT
2008
ACM
129views Database» more  EDBT 2008»
14 years 4 months ago
Design of PriServ, a privacy service for DHTs
By decentralizing control, P2P systems provide efficient, scalable data sharing. However, when sharing data for different purposes (e.g., billing, purchase, shipping, etc.), data ...
Mohamed Jawad, Patricia Serrano-Alvarado, Patrick ...
EDBT
2008
ACM
144views Database» more  EDBT 2008»
14 years 4 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 5 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
ICDE
2002
IEEE
141views Database» more  ICDE 2002»
14 years 6 months ago
Providing Database as a Service
In this paper, we explore a new paradigm for data management in which a third party service provider hosts "database as a service" providing its customers seamless mecha...
Balakrishna R. Iyer, Hakan Hacigümüs, Sh...
ICDE
2005
IEEE
170views Database» more  ICDE 2005»
14 years 6 months ago
Data Privacy through Optimal k-Anonymization
Roberto J. Bayardo Jr., Rakesh Agrawal