Sciweavers

68 search results - page 8 / 14
» Achieving Privacy Preservation when Sharing Data for Cluster...
Sort
View
TPDS
2008
130views more  TPDS 2008»
14 years 9 months ago
NFS-CD: Write-Enabled Cooperative Caching in NFS
We present the Network File System with Cluster Delegation (NFS-CD), an enhancement to the NFSv4 that reduces server load and increases the scalability of distributed file systems ...
Alexandros Batsakis, Randal C. Burns
ISSRE
2010
IEEE
14 years 8 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 6 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
89
Voted
COMSNETS
2012
183views more  COMSNETS 2012»
13 years 5 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
ICDE
2008
IEEE
219views Database» more  ICDE 2008»
15 years 11 months ago
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such th...
Osman Abul, Francesco Bonchi, Mirco Nanni