Sciweavers

5255 search results - page 123 / 1051
» Formal Methods for Privacy
Sort
View
101
Voted
SAS
2010
Springer
126views Formal Methods» more  SAS 2010»
15 years 1 months ago
From Object Fields to Local Variables: A Practical Approach to Field-Sensitive Analysis
Elvira Albert, Puri Arenas, Samir Genaim, German P...
109
Voted
SAS
2010
Springer
152views Formal Methods» more  SAS 2010»
15 years 1 months ago
Modelling Metamorphism by Abstract Interpretation
Mila Dalla Preda, Roberto Giacobazzi, Saumya K. De...
127
Voted
ISOLA
2010
Springer
15 years 1 months ago
Dependability Analysis and Verification for Connected Systems
Felicita Di Giandomenico, Marta Z. Kwiatkowska, Ma...
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 3 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
JIDM
2010
122views more  JIDM 2010»
15 years 1 months ago
Revisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering w...
Stanley R. M. Oliveira, Osmar R. Zaïane