Sciweavers

210 search results - page 9 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
DMIN
2006
115views Data Mining» more  DMIN 2006»
15 years 1 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
ESORICS
2009
Springer
15 years 6 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
KBSE
2006
IEEE
15 years 5 months ago
Command-Form Coverage for Testing Database Applications
The testing of database applications poses new challenges for software engineers. In particular, it is difficult to thoroughly test the interactions between an application and it...
William G. J. Halfond, Alessandro Orso
SDMW
2004
Springer
15 years 5 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 2 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...