Sciweavers

653 search results - page 45 / 131
» Database Privacy
Sort
View
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
15 years 6 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
ICDE
2007
IEEE
143views Database» more  ICDE 2007»
16 years 1 months ago
Hiding in the Crowd: Privacy Preservation on Evolving Streams through Correlation Tracking
We address the problem of preserving privacy in streams, which has received surprisingly limited attention. For static data, a well-studied and widely used approach is based on ra...
Feifei Li, Jimeng Sun, Spiros Papadimitriou, Georg...
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
16 years 1 months ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
15 years 6 months ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
15 years 12 months ago
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
Jiexing Li, Yufei Tao, Xiaokui Xiao