Sciweavers

1906 search results - page 129 / 382
» Data Privacy
Sort
View
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 4 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
15 years 7 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 9 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
CSE
2009
IEEE
15 years 4 months ago
Mining Mobility Behavior from Trajectory Data
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes o...
Fosca Giannotti, Mirco Nanni, Dino Pedreschi, Chia...
CCS
2010
ACM
15 years 3 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...