Sciweavers

901 search results - page 42 / 181
» On Anonymization of String Data
Sort
View
FCCM
2011
IEEE
311views VLSI» more  FCCM 2011»
14 years 3 months ago
String Matching in Hardware Using the FM-Index
—String matching is a ubiquitous problem that arises in a wide range of applications in computing, e.g., packet routing, intrusion detection, web querying, and genome analysis. D...
Edward Fernandez, Walid Najjar, Stefano Lonardi
CIKM
2008
Springer
15 years 1 months ago
Privacy-preserving data publishing for horizontally partitioned databases
There is an increasing need for sharing data repositories containing personal information across multiple distributed, possibly untrusted, and private databases. Such data sharing...
Pawel Jurczyk, Li Xiong
KDD
2007
ACM
121views Data Mining» more  KDD 2007»
16 years 6 days ago
Preserving the Privacy of Sensitive Relationships in Graph Data
Abstract. In this paper, we focus on the problem of preserving the privacy of sensitive relationships in graph data. We refer to the problem of inferring sensitive relationships fr...
Elena Zheleva, Lise Getoor
KDD
2008
ACM
162views Data Mining» more  KDD 2008»
16 years 6 days ago
Composition attacks and auxiliary information in data privacy
Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary informatio...
Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanat...
ICDM
2006
IEEE
127views Data Mining» more  ICDM 2006»
15 years 5 months ago
Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching
In recent years, a major thread of research on kanonymity has focused on developing more flexible generalization schemes that produce higher-quality datasets. In this paper we in...
Tiancheng Li, Ninghui Li