Sciweavers

770 search results - page 94 / 154
» Privacy Preserving Joins
Sort
View
IEEEARES
2010
IEEE
15 years 6 months ago
Formalization of Viruses and Malware Through Process Algebras
Abstract—Abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. Considering recent malware, these are only partially cov...
Grégoire Jacob, Eric Filiol, Hervé D...
IEEEARES
2008
IEEE
15 years 6 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen
WWW
2007
ACM
16 years 16 days ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
EDBT
2010
ACM
110views Database» more  EDBT 2010»
15 years 6 months ago
The hardness and approximation algorithms for l-diversity
The existing solutions to privacy preserving publication can be classified into the theoretical and heuristic categories. The former guarantees provably low information loss, whe...
Xiaokui Xiao, Ke Yi, Yufei Tao
ATAL
2007
Springer
15 years 6 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak