Sciweavers

234 search results - page 23 / 47
» Data collection with self-enforcing privacy
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 7 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
DBSEC
2008
365views Database» more  DBSEC 2008»
14 years 11 months ago
Secure Construction of Contingency Tables from Distributed Data
Abstract. Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. Indeed, due to their simplicity and ...
Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. A...
ECEH
2006
155views Healthcare» more  ECEH 2006»
14 years 11 months ago
A Data Network for Health e-Research
: Sharing health data for research purposes across data custodian boundaries poses technical, organisational and ethical challenges. We describe a service oriented architecture for...
Kerry L. Taylor, Christine M. O'Keefe, John Colton...
JIB
2007
88views more  JIB 2007»
14 years 10 months ago
Achieving k-anonymity in DataMarts used for gene expressions exploitation
Gene expression profiling is a sophisticated method to discover differences in activation patterns of genes between different patient collectives. By reasonably defining patient...
Konrad Stark, Johann Eder, Kurt Zatloukal