Sciweavers

IAJIT
2010
157views more  IAJIT 2010»
13 years 2 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 2 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
CIKM
2010
Springer
13 years 2 months ago
Preserving location and absence privacy in geo-social networks
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal c...
Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti,...
CCS
2010
ACM
13 years 3 months ago
PriMa: an effective privacy protection mechanism for social networks
In this paper, we propose PriMa (Privacy Manager), a privacy protection mechanism which supports semi-automated generation of access rules for users’ profile information. PriMa...
Anna Cinzia Squicciarini, Federica Paci, Smitha Su...
PVLDB
2008
146views more  PVLDB 2008»
13 years 3 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
PVLDB
2008
101views more  PVLDB 2008»
13 years 3 months ago
Output perturbation with query relaxation
Given a dataset containing sensitive personal information, a statistical database answers aggregate queries in a manner that preserves individual privacy. We consider the problem ...
Xiaokui Xiao, Yufei Tao
VLDB
2002
ACM
123views Database» more  VLDB 2002»
13 years 4 months ago
Maintaining Data Privacy in Association Rule Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. We investigate here,...
Shariq Rizvi, Jayant R. Haritsa
SIGKDD
2002
172views more  SIGKDD 2002»
13 years 4 months ago
Data Mining, National Security, Privacy and Civil Liberties
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. Keywor...
Bhavani M. Thuraisingham
SIGKDD
2002
93views more  SIGKDD 2002»
13 years 4 months ago
Randomization in Privacy-Preserving Data Mining
Suppose there are many clients, each having some personal information, and one server, which is interested only in aggregate, statistically significant, properties of this informa...
Alexandre V. Evfimievski
SIGIR
2002
ACM
13 years 4 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny