301
Voted
ICDE
17 years 4 days ago
2009 IEEE
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult
for the d...
ICDE
15 years 7 months ago
2009 IEEE
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
252
Voted
ICDE
17 years 4 days ago
2009 IEEE
Context is any information used to characterize the situation of an entity. Examples of contexts includetime, location, identity, and activity of a user. This paper proposes a gene...
239
Voted
ICDE
17 years 3 days ago
2009 IEEE
Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA). This ...
230
click to vote
ICDE
16 years 2 months ago
2009 IEEE
Graphs are being increasingly used to model a wide range of scientific data. Such widespread usage of graphs has generated considerable interest in mining patterns from graph datab...
|