Sciweavers

210 search results - page 7 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
ICSE
2003
IEEE-ACM
15 years 11 months ago
Demonstration of AGENDA Tool Set for Testing Relational Database Applications
Database systems play an important role in nearly every modern organization, yet relatively little research effort has focused on how to test them. AGENDA, A (test) GENerator for ...
David Chays, Yuetang Deng
ICISC
2009
184views Cryptology» more  ICISC 2009»
14 years 9 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
195
Voted
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
16 years 1 months ago
Preserving Privacy in Social Networks Against Neighborhood Attacks
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
Bin Zhou 0002, Jian Pei
PODS
2001
ACM
148views Database» more  PODS 2001»
15 years 11 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
VLDB
2006
ACM
122views Database» more  VLDB 2006»
15 years 12 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton