Sciweavers

1906 search results - page 32 / 382
» Data Privacy
Sort
View
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
15 years 11 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
ESORICS
2007
Springer
15 years 5 months ago
Fragmentation and Encryption to Enforce Privacy in Data Storage
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. Technical considerations and many significant commercial and legal regulations ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
ACSC
2004
IEEE
15 years 2 months ago
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Knowledge discovery allows considerable insight into data. This brings with it the inherent risk that what is inferred may be private or ethically sensitive. The process of genera...
Peter Fule, John F. Roddick
75
Voted
ICDE
2010
IEEE
235views Database» more  ICDE 2010»
15 years 10 months ago
Privacy in Data Publishing
Privacy in data publishing has received much attention recently. The key to defining privacy is to model knowledge of the attacker ? if the attacker is assumed to know too little,...
Johannes Gehrke, Daniel Kifer, Ashwin Machanavajjh...
69
Voted
HASE
2008
IEEE
15 years 5 months ago
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management
Privacy, preservation and performance (“3 P’s”) are central design objectives for distributed data management systems. However, these objectives tend to compete with one ano...
Bobji Mungamuru, Hector Garcia-Molina