Sciweavers

654 search results - page 31 / 131
» Privacy protection for RFID data
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 1 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
15 years 10 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
13 years 16 days ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
SDMW
2004
Springer
15 years 3 months ago
Achieving Privacy Preservation when Sharing Data for Clustering
Abstract. In this paper, we address the problem of protecting the underlying attribute values when sharing data for clustering. The challenge is how to meet privacy requirements an...
Stanley R. M. Oliveira, Osmar R. Zaïane
ICDE
2010
IEEE
182views Database» more  ICDE 2010»
15 years 9 months ago
Global Privacy Guarantee in Serial Data Publishing
While previous works on privacy-preserving serial data publishing consider the scenario where sensitive values may persist over multiple data releases, we find that no previous wor...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, K...