Sciweavers

653 search results - page 68 / 131
» Database Privacy
Sort
View
105
Voted
ADC
2010
Springer
204views Database» more  ADC 2010»
14 years 7 months ago
Systematic clustering method for l-diversity model
Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an eff...
Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxian...
PODS
2011
ACM
229views Database» more  PODS 2011»
14 years 2 months ago
On the complexity of privacy-preserving complex event processing
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspecified event patterns. While CEP systems have been ad...
Yeye He, Siddharth Barman, Di Wang, Jeffrey F. Nau...
CIKM
2008
Springer
15 years 1 months ago
Privacy-preserving data publishing for horizontally partitioned databases
There is an increasing need for sharing data repositories containing personal information across multiple distributed, possibly untrusted, and private databases. Such data sharing...
Pawel Jurczyk, Li Xiong
EDBT
2008
ACM
112views Database» more  EDBT 2008»
16 years 27 min ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
CIKM
2008
Springer
15 years 1 months ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...