Sciweavers

207 search results - page 27 / 42
» Limiting privacy breaches in privacy preserving data mining
Sort
View
ASIACRYPT
2005
Springer
15 years 5 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
CCS
2007
ACM
15 years 5 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
15 years 23 days ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 6 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
15 years 3 months ago
Realizing Privacy-Preserving Features in Hippocratic Databases
Preserving privacy has become a crucial requirement for operating a business that manages personal data. Hippocratic databases have been proposed to answer this requirement throug...
Yasin Laura-Silva, Walid G. Aref