Sciweavers

901 search results - page 76 / 181
» On Anonymization of String Data
Sort
View
ICDM
2009
IEEE
143views Data Mining» more  ICDM 2009»
15 years 8 months ago
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
VLDB
2006
ACM
490views Database» more  VLDB 2006»
17 years 1 months ago
The New Casper: Query Processing for Location Services without Compromising Privacy
This paper tackles a major privacy concern in current location-based services where users have to continuously report their locations to the database server in order to obtain the ...
Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref
DEXAW
2003
IEEE
94views Database» more  DEXAW 2003»
15 years 6 months ago
Experiences Running a Web Anonymising Service
The research project “AN.ON – Anonymity online” focuses on developing and providing a web anonymising service. This service provides anonymity and unobservability against ex...
Claudia Golembiewski, Marit Hansen, Sandra Steinbr...
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
16 years 1 months ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
15 years 10 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu