Sciweavers

137 search results - page 11 / 28
» Preserving Privacy through Data Generation
Sort
View
CCS
2009
ACM
15 years 4 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
101
Voted
ACSAC
2007
IEEE
15 years 3 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
ACSC
2004
IEEE
15 years 1 months ago
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Knowledge discovery allows considerable insight into data. This brings with it the inherent risk that what is inferred may be private or ethically sensitive. The process of genera...
Peter Fule, John F. Roddick
PVLDB
2008
101views more  PVLDB 2008»
14 years 9 months ago
Output perturbation with query relaxation
Given a dataset containing sensitive personal information, a statistical database answers aggregate queries in a manner that preserves individual privacy. We consider the problem ...
Xiaokui Xiao, Yufei Tao
IEEEARES
2008
IEEE
15 years 4 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul