Sciweavers

10 search results - page 2 / 2
» Dynamic anonymization: accurate statistical analysis with pr...
Sort
View
WWW
2007
ACM
16 years 7 days ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
SIGMOD
2007
ACM
156views Database» more  SIGMOD 2007»
15 years 11 months ago
M-invariance: towards privacy preserving re-publication of dynamic datasets
The previous literature of privacy preserving data publication has focused on performing "one-time" releases. Specifically, none of the existing solutions supports re-pu...
Xiaokui Xiao, Yufei Tao
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 5 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
ICDT
2007
ACM
148views Database» more  ICDT 2007»
15 years 5 months ago
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Cynthia Dwork
SIGSOFT
2008
ACM
16 years 9 days ago
Profile-guided program simplification for effective testing and analysis
Many testing and analysis techniques have been developed for inhouse use. Although they are effective at discovering defects before a program is deployed, these techniques are oft...
Lingxiao Jiang, Zhendong Su