Sciweavers

71 search results - page 10 / 15
» Data protection in outsourcing scenarios: issues and directi...
Sort
View
DAWAK
2006
Springer
15 years 3 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
KDD
2005
ACM
149views Data Mining» more  KDD 2005»
15 years 5 months ago
A distributed learning framework for heterogeneous data sources
We present a probabilistic model-based framework for distributed learning that takes into account privacy restrictions and is applicable to scenarios where the different sites ha...
Srujana Merugu, Joydeep Ghosh
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 3 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 5 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
CIDM
2007
IEEE
15 years 6 months ago
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
Lisa Singh, Mehmet Sayal