Sciweavers

102 search results - page 7 / 21
» Privacy Aware Data Generation for Testing Database Applicati...
Sort
View
143
Voted
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
15 years 2 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
121
Voted
SAFECOMP
2005
Springer
15 years 7 months ago
Control and Data Flow Testing on Function Block Diagrams
As programmable logic controllers(PLCs) have been used in safety-critical applications, testing of PLC applications has become important. The previous PLC-based software testing te...
Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha
291
Voted
VLDB
2006
ACM
122views Database» more  VLDB 2006»
16 years 2 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
107
Voted
DATE
2010
IEEE
141views Hardware» more  DATE 2010»
15 years 6 months ago
An embedded platform for privacy-friendly road charging applications
—Systems based on satellite localization are enabling new scenarios for road charging schemes by offering the possibility to charge drivers as a function of their road usage. An ...
Josep Balasch, Ingrid Verbauwhede, Bart Preneel
ACSAC
2001
IEEE
15 years 5 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li