Sciweavers

1906 search results - page 85 / 382
» Data Privacy
Sort
View
ISDA
2008
IEEE
15 years 5 months ago
Novel Algorithms for Privacy Preserving Utility Mining
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the shari...
Jieh-Shan Yeh, Po-Chiang Hsu, Ming-Hsun Wen
IAJIT
2010
157views more  IAJIT 2010»
14 years 9 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
SIGMOD
2011
ACM
283views Database» more  SIGMOD 2011»
14 years 2 months ago
iReduct: differential privacy with reduced relative errors
Prior work in differential privacy has produced techniques for answering aggregate queries over sensitive data in a privacypreserving way. These techniques achieve privacy by addi...
Xiaokui Xiao, Gabriel Bender, Michael Hay, Johanne...
ICC
2009
IEEE
246views Communications» more  ICC 2009»
15 years 6 months ago
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
—The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy wou...
Aldar Chun-fai Chan
WPES
2003
ACM
15 years 4 months ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng