Sciweavers

653 search results - page 112 / 131
» Database Privacy
Sort
View
DEXA
2007
Springer
140views Database» more  DEXA 2007»
15 years 8 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
15 years 7 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
SDMW
2005
Springer
15 years 7 months ago
An Authorization Framework for Sharing Data in Web Service Federations
In this paper we present our authorization framework that supports the dynamic set-up of Web service federations for sharing data within virtual federations. Building on previous w...
Martin Wimmer, Alfons Kemper
CSMR
2003
IEEE
15 years 7 months ago
Software Services and Software Maintenance
Software services are being promoted as the next big step forward in software engineering.. Inevitably, both service vendor and service client programs will require maintenance. W...
Keith H. Bennett, Jie Xu
PAKDD
2010
ACM
275views Data Mining» more  PAKDD 2010»
15 years 6 months ago
Anonymizing Transaction Data by Integrating Suppression and Generalization
Abstract. Privacy protection in publishing transaction data is an important problem. A key feature of transaction data is the extreme sparsity, which renders any single technique i...
Junqiang Liu, Ke Wang