Sciweavers

207 search results - page 30 / 42
» Limiting privacy breaches in privacy preserving data mining
Sort
View
ADC
2007
Springer
145views Database» more  ADC 2007»
15 years 5 months ago
The Privacy of k-NN Retrieval for Horizontal Partitioned Data -- New Methods and Applications
Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retr...
Artak Amirbekyan, Vladimir Estivill-Castro
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 6 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
15 years 11 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 9 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
PVLDB
2010
95views more  PVLDB 2010»
14 years 10 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang